yep know. It is a dedicated access file. Renamed it to relay_auth, to make it more clear what the file is for.

But a question: Why do you like sasl authentication? Isn't it more secure to have no authentication at all and instead
rely on client IP?
Then theres no authentication to hack.
I even have "smtpd_sasl_auth_enable = no", so theres absolutely nothing a outsider can do to get a mail relayed through my server.

About delay_reject, I did set it to yes to be sure (so even in case that postfix was compiled - it was shipped with lubuntu - with "no", it will still be a yes)

-----Ursprungligt meddelande----- From: Viktor Dukhovni
Sent: Wednesday, May 07, 2014 9:15 PM
To: [email protected]
Subject: Re: Configure postfix to reject forged mail?

On Wed, May 07, 2014 at 09:04:37PM +0200, Sebastian Nielsen wrote:

About the "forgetting" of the purpose of the access file:
Did put a comment block in the access file:

#NEVER EVER PUT ANYTHING YOU DONT WANT TO BE OPEN RELAY FOR IN THIS FILE#
#ONLY USE PERMIT_MYNETWORKS OR SIMILIAR RESTRICTIONS#
sebbe.eu permit_mynetworks, reject

Then I will never forget, and successors of me wont break the open relay
prevention system.

Belt and suspenders, apply the check in smtpd_sender_restrictions,
and don't set "smtpd_delay_reject = no".  Document this requirement.

In the dedicated access file (yes, not named "access") the comments
should state that this must never return an unconditional OK for
any lookup keys.  Only "permit_mynetworks", "permit_sasl_authenticated"
or similar are acceptable, because this access file is for relay
access by sender domain, and sender domains are easy to forge, so
real access control must still be applied.

--
Viktor.

Reply via email to