Francina Oates: > The lack of socks support is an increasingly serious shortcoming > of Postfix.
You are welcome to donate code. Wietse --- I looked at the code in smtp_connect.c, it looked too complicated for me :) That's sad, because the socks protocol is very simple. Someone you emailed with in 2002 claimed to have done it, and then there are a handful of claims on the Internet that do not work. I looked at installing an mta in parallel with Postfix, and it's only the big ones courier, exim, qmail that are actually routing and they don't like to be installed together with Postfix. I even tried to run a tsocks-wrapped second Postfix. Not easy. Not working. So, what I will do is to write a pipe delivery agent. Postfix provides enough macros for the MX dns lookup and the envelope, and I can use the bash script as a tsocks wrapper, launching a second script utilizing some smtp library. That looks like a suitable weekend project. - macros are provided as command line arguments - the message text is available at stdin - status code 75 means defer, 0 means success - Postfix copies stdout output to mail.log To clarify for lists()rhsoft.net: Adding the socks protocol to smtp allows for end-to-end TLS encryption despite that the email appears to be sent from an intermediate node. Socks removes the requirement to trust the provider of that intermediate node and public IP address. A traffic logger or disk image snooper will see the destination mta ip but none of the message. Frequently, the destination is common like gmail, and the obtained information is of little value. The hundreds of Bitcoin breaches are symptoms of cloud security being nonexistent. It would surprise me if the NSA are responsible for those.