Hi, >>> This is normal operation for a general-purpose mail server. Mail to >>> local users can be received from anywhere (subject to spam >>> controls). Only authorized users can relay to a third-party >>> destinations. >>> >>> This is a typical setup for an internet-facing mail server. >> >> It's somewhat of an internal server, despite being connected to the >> Internet. No one was ever supposed to connect to it directly, and >> trying to convert everyone to SMTP Auth is going to be a challenge. > > The config for an internal server is pretty simple, something like > > smtpd_recipient_restrictions = > check_client_access hash:/etc/postfix/allowed_clients > check_client_access hash:/etc/postfix/pop-b-smtp > # next line optional > permit_mynetworks > # finally, reject anything not explicitly allowed > reject
Got it. I will just move the check_client/sender access lists above permit_mynetworks. If I have a complete map of check_recipient_access users, it's generally a good idea to use reject at the end, or it otherwise permits, correct? Not just in terms of an internal server, but also for our relay. >>>> I'm working on >>>> upgrading the server to use SMTP Auth, and only allowing port 25 from >>>> trusted relays, but it's a long process. > > Don't bother until you've upgraded postfix. Getting AUTH (and TLS, > which you'll need with AUTH) to work on ancient postfix isn't always > easy, and you won't get much help here. And AUTH with dovecot wasn't > supported until postfix 2.something. Yes, I should have made that more clear. This is a brand new system with fc18. Thanks, Alex