Hello

On Thu, Feb 23, 2012, at 04:36 PM, Noel Jones wrote:
> >     cat /etc/postfix/spamtrap_userparts
> >         test1
> >         test2
> >         test3
> >     postmap /etc/postfix/spamtrap_userparts

> Wrong format; table entries must have a result.  In this specific
> case, postfix doesn't actually use the result, but *something* must
> be there.

Gotcha.

> And I'm pretty sure you need full addresses, not just usernames.
> 
> # these are all considered valid users
> te...@example.tld  valid_user
> te...@example.tld  Anything
> te...@example.tld  melt_CPU

Noted.

In this check I've only been using SQL stored function calls in the
queries (query = SELECT func('arg');), where the query results are just
"1" or "null",

        postmap -q valid_domain_part
        proxy:mysql:/etc/postfix/sql/vdomains.cf
                1
        postmap -q invalid_domain_part
        proxy:mysql:/etc/postfix/sql/vdomains.cf
                null
        postmap -q valid_user_part
        proxy:mysql:/etc/postfix/sql/vmailboxes.cf
                1
        postmap -q invalid_user_part
        proxy:mysql:/etc/postfix/sql/vmailboxes.cf
                null

and it's been working great.  Didn't realize that there was a
full_address requirement for the hash: table check.  Thanks for pointing
out the possibility -- I'll keep an eye on it.

> > +    virtual_mailbox_maps = hash:/etc/postfix/spamtrap_userparts
> > +                   proxy:mysql:/etc/postfix/sql/vmailboxes.cf

> Yes, that should work fine without any ill effects.

> > should now actually receive, and hopefully trigger upon, the
> > spamtrap-containing message?

> Yes.

Then, I've homework to do.  Thanks again.

Cheers,

Roger

Reply via email to