I am trying to fix a mailman footer issue as described here:

https://stuff.mit.edu/~jik/software/mailman_mimedefang/mailman_mimedefang_fix_footer.pl.txt

I believe I have everything set up including this line in main.cf:

smtpd_milters = inet:127.0.0.1:19534

However, there doesn't appear to be any action taken.  Is there any way
in postfix to determine that the milter is actually being run?  I tried
setting syslog to debug but that didn't show anything.

Is it possible that mail arriving locally is bypassing the milter?

postconf -n attached.  I only removed the tls lines.

-- 
D'Arcy J.M. Cain
System Administrator, Vex.Net
http://www.Vex.Net/ IM:da...@vex.net
VoIP: sip:da...@vex.net
alias_database = hash:/etc/postfix/aliases hash:/var/db/mailman/data/aliases
alias_maps = hash:/etc/postfix/aliases, hash:/var/db/mailman/data/aliases
always_add_missing_headers = yes
body_checks = regexp:/var/postfix/virus_body_checks
bounce_queue_lifetime = 3d
broken_sasl_auth_clients = yes
command_directory = /usr/sbin
command_time_limit = 5000
config_directory = /etc/postfix
daemon_directory = /usr/libexec/postfix
data_directory = /var/db/postfix
debug_peer_level = 2
default_destination_concurrency_limit = 10
disable_vrfy_command = yes
header_checks = regexp:/var/postfix/virus_header_checks                
regexp:/var/postfix/header_checks                regexp:/var/postfix/auth_checks
home_mailbox = mail/INBOX/
html_directory = no
local_destination_concurrency_limit = 2
mail_owner = postfix
mail_spool_directory = /var/mail
mailbox_command = /usr/pkg/bin/procmail
mailbox_size_limit = 1024000000
mailq_path = /usr/bin/mailq
manpage_directory = /usr/man
masquerade_domains = shell.vex.net, smaug.vex.net
masquerade_exceptions = root, db, pgsql
maximal_queue_lifetime = 3d
message_size_limit = 104857600
mydestination = $mydomain,  aragorn.$mydomain,  db.$mydomain,  druid.$mydomain, 
 gollum.$mydomain,  mail.$mydomain,  mailman.$mydomain,  pop.$mydomain,  
sauron.$mydomain,  shell.$mydomain,  smaug.$mydomain,  vex.$mydomain
mydomain = vex.net
myhostname = mail.vex.net
mynetworks = 127.0.0.0/8,  98.158.139.64/27,  192.168.151.0/24,  
207.35.13.14/32,  64.99.180.16/29,  50.243.220.60/32
mynetworks_style = subnet
myorigin = $mydomain
newaliases_path = /usr/bin/newaliases
owner_request_special = no
postscreen_access_list = permit_mynetworks,     
cidr:/var/postfix/postscreen_access.cidr
postscreen_dnsbl_action = enforce
postscreen_greet_action = enforce
queue_directory = /var/spool/postfix
recipient_delimiter = +
sendmail_path = /usr/sbin/sendmail
setgid_group = maildrop
smtp_bind_address = 98.158.139.68
smtpd_client_restrictions = permit_mynetworks,        
permit_sasl_authenticated,        reject_rbl_client zen.spamhaus.org,        
reject_rbl_client psbl.surriel.com        permit
smtpd_delay_reject = yes
smtpd_helo_required = yes
smtpd_helo_restrictions = permit_mynetworks,        permit_sasl_authenticated,  
      reject_invalid_hostname,        permit
smtpd_milters = inet:127.0.0.1:19534
smtpd_recipient_restrictions = permit_mynetworks,        
reject_unlisted_recipient,        permit_sasl_authenticated,        
reject_unauth_pipelining,        reject_unauth_destination,        
check_policy_service inet:127.0.0.1:2525        warn_if_reject 
reject_invalid_helo_hostname,        reject_non_fqdn_helo_hostname,        
reject_unknown_recipient_domain,        permit
smtpd_sasl_auth_enable = yes
smtpd_sasl_authenticated_header = yes
smtpd_sasl_local_domain = $mydomain
smtpd_sasl_path = private/dovecot-auth
smtpd_sasl_security_options = noanonymous
smtpd_sasl_type = dovecot
smtpd_sender_restrictions = permit_mynetworks,        
permit_sasl_authenticated,        reject_unauth_destination,        
check_client_access hash:/var/postfix/client_access,        check_sender_access 
hash:/var/postfix/sender_access,        permit
tls_random_source = dev:/dev/urandom
transport_maps = hash:/var/postfix/transport
unknown_local_recipient_reject_code = 550
virtual_mailbox_limit = 0

Reply via email to