On 4/8/2014 12:32 PM, Noel Jones wrote: > On 4/8/2014 11:32 AM, Roberto Carraro wrote: >> Hello, >> for reasons that I still have to investigate my Postfix server is >> sending mails to an outgoing server to the address: >> zamu...@spyandfly.com >> I would really like to know the content of those mails, if it is >> possible... >> Most important, how can I block mails to that address or to the >> entire domain? > > I suspect these are bounces of undeliverable mail. The proper > solution is to not accept mail you can't deliver. > > some random nuggets: > > Bounces generated by postfix are not subject to the normal access > controls and cannot be blocked with an access map or header/body checks. > > > Display the contents of the postfix queue with either of > # mailq > -- or -- > # postqueue -q
oops, that should be # postqueue -p -- Noel Jones > > > View the contents of a message in the queue with the postcat command. > # postcat -q QUEUEID | less > > > You can delay mail in the queue by adding a transport_maps entry > pointing to the defer: transport. Release the deferred mail with > "postqueue -i QUEUEID" > # main.cf > transport_maps = hash:/etc/postfix/transport > # transport > example.com defer: > > > > -- Noel Jones > > >> >> This is my config: >> >> alias_database = hash:/etc/aliases >> alias_maps = hash:/etc/aliases >> append_dot_mydomain = no >> biff = no >> config_directory = /etc/postfix >> header_checks = regexp:/etc/postfix/header_checks >> home_mailbox = Maildir/ >> inet_interfaces = all >> inet_protocols = ipv4 >> mailbox_command = /usr/bin/maildrop >> mailbox_size_limit = 0 >> mydestination = ***.com, robhost, localhost, mail.***.com >> myhostname = mail.***.com >> mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 >> myorigin = ***.com >> readme_directory = no >> recipient_delimiter = + >> relayhost = >> smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache >> smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu) >> smtpd_data_restrictions = reject_unauth_pipelining >> reject_multi_recipient_bounce >> smtpd_delay_reject = yes >> smtpd_helo_required = yes >> smtpd_recipient_restrictions = check_recipient_access >> hash:/etc/postfix/bad_recipients >> permit_mynetworks permit_sasl_authenticated >> reject_unauth_destination >> reject_non_fqdn_recipient >> reject_non_fqdn_sender >> reject_unknown_sender_domain >> reject_unknown_recipient_domain >> check_recipient_access hash:/etc/postfix/roleaccount_exceptions >> check_client_access hash:/etc/postfix/client_access >> check_sender_access hash:/etc/postfix/sender_access >> reject_non_fqdn_hostname >> reject_invalid_hostname >> check_helo_access pcre:/etc/postfix/helo_checks >> check_sender_mx_access cidr:/etc/postfix/bogus_mx >> reject_unknown_client_hostname >> check_policy_service inet:127.0.0.1:10023 >> permit >> smtpd_tls_cert_file = /etc/ssl/certs/ssl-cert-snakeoil.pem >> smtpd_tls_key_file = /etc/ssl/private/ssl-cert-snakeoil.key >> smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache >> smtpd_use_tls = yes >> virtual_alias_domains = ****.it >> virtual_alias_maps = hash:/etc/postfix/virtual >> >> And this is where I tried to block the entire domain, but it seems >> ineffective: >> >> $ cat /etc/postfix/bad_recipients >> >> spyandfly.com REJECT >> >> Thank you in advance. >> >