I am trying to fix a mailman footer issue as described here: https://stuff.mit.edu/~jik/software/mailman_mimedefang/mailman_mimedefang_fix_footer.pl.txt
I believe I have everything set up including this line in main.cf: smtpd_milters = inet:127.0.0.1:19534 However, there doesn't appear to be any action taken. Is there any way in postfix to determine that the milter is actually being run? I tried setting syslog to debug but that didn't show anything. Is it possible that mail arriving locally is bypassing the milter? postconf -n attached. I only removed the tls lines. -- D'Arcy J.M. Cain System Administrator, Vex.Net http://www.Vex.Net/ IM:da...@vex.net VoIP: sip:da...@vex.net
alias_database = hash:/etc/postfix/aliases hash:/var/db/mailman/data/aliases alias_maps = hash:/etc/postfix/aliases, hash:/var/db/mailman/data/aliases always_add_missing_headers = yes body_checks = regexp:/var/postfix/virus_body_checks bounce_queue_lifetime = 3d broken_sasl_auth_clients = yes command_directory = /usr/sbin command_time_limit = 5000 config_directory = /etc/postfix daemon_directory = /usr/libexec/postfix data_directory = /var/db/postfix debug_peer_level = 2 default_destination_concurrency_limit = 10 disable_vrfy_command = yes header_checks = regexp:/var/postfix/virus_header_checks regexp:/var/postfix/header_checks regexp:/var/postfix/auth_checks home_mailbox = mail/INBOX/ html_directory = no local_destination_concurrency_limit = 2 mail_owner = postfix mail_spool_directory = /var/mail mailbox_command = /usr/pkg/bin/procmail mailbox_size_limit = 1024000000 mailq_path = /usr/bin/mailq manpage_directory = /usr/man masquerade_domains = shell.vex.net, smaug.vex.net masquerade_exceptions = root, db, pgsql maximal_queue_lifetime = 3d message_size_limit = 104857600 mydestination = $mydomain, aragorn.$mydomain, db.$mydomain, druid.$mydomain, gollum.$mydomain, mail.$mydomain, mailman.$mydomain, pop.$mydomain, sauron.$mydomain, shell.$mydomain, smaug.$mydomain, vex.$mydomain mydomain = vex.net myhostname = mail.vex.net mynetworks = 127.0.0.0/8, 98.158.139.64/27, 192.168.151.0/24, 207.35.13.14/32, 64.99.180.16/29, 50.243.220.60/32 mynetworks_style = subnet myorigin = $mydomain newaliases_path = /usr/bin/newaliases owner_request_special = no postscreen_access_list = permit_mynetworks, cidr:/var/postfix/postscreen_access.cidr postscreen_dnsbl_action = enforce postscreen_greet_action = enforce queue_directory = /var/spool/postfix recipient_delimiter = + sendmail_path = /usr/sbin/sendmail setgid_group = maildrop smtp_bind_address = 98.158.139.68 smtpd_client_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_rbl_client zen.spamhaus.org, reject_rbl_client psbl.surriel.com permit smtpd_delay_reject = yes smtpd_helo_required = yes smtpd_helo_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_invalid_hostname, permit smtpd_milters = inet:127.0.0.1:19534 smtpd_recipient_restrictions = permit_mynetworks, reject_unlisted_recipient, permit_sasl_authenticated, reject_unauth_pipelining, reject_unauth_destination, check_policy_service inet:127.0.0.1:2525 warn_if_reject reject_invalid_helo_hostname, reject_non_fqdn_helo_hostname, reject_unknown_recipient_domain, permit smtpd_sasl_auth_enable = yes smtpd_sasl_authenticated_header = yes smtpd_sasl_local_domain = $mydomain smtpd_sasl_path = private/dovecot-auth smtpd_sasl_security_options = noanonymous smtpd_sasl_type = dovecot smtpd_sender_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination, check_client_access hash:/var/postfix/client_access, check_sender_access hash:/var/postfix/sender_access, permit tls_random_source = dev:/dev/urandom transport_maps = hash:/var/postfix/transport unknown_local_recipient_reject_code = 550 virtual_mailbox_limit = 0