> Le 20 juil. 2015 à 12:46, Wietse Venema <wie...@porcupine.org> a écrit :
> 
> Alexandre Ellert:
>> Hello,
>> 
>> I often use sender_bcc_maps to audit suspicious account and it works great.
>> Today, I need to have a look at email sent by null sender <>
>> 
>> Here is my relevant configuration :
>> 
>> # grep sender_bcc_maps  /etc/postfix/main.cf
>> sender_bcc_maps = regexp:/etc/postfix/sender_bcc_maps
>> 
>> # cat /etc/postfix/sender_bcc_maps
>> # This one usually works fine
>> #/^u...@example.com <mailto:u...@exemple.com>$/              
>> au...@example.org
>> /^$/                                                 au...@example.org
>> /<>/                                                 audit@example. 
>> <mailto:au...@exemple.com>org
> 
> Postfix does not make queries with empty strings because some
> software can't handle it. You can't use /^$/ patterns for any
> Postfix lookup table.
> 
> As documented, sender_bcc_maps does not map null query keys to <>.
> You can't use <> patterns in sender_bcc_maps.
> 
> Use check_sender_access instead. As documented, it maps null query
> keys to <>.
> 
>       Wietse

If I understand well your answer and the documentation, this solution should 
work with Postfix 3.0:
1. remove sender_bcc_maps directive
2. add a check_sender_access. For example :
smtpd_recipient_restrictions = check_sender_access 
regexp:/etc/postfix/sender_bcc_maps_including_null_sender, [other stuff here], 
reject
3. create /etc/postfix/sender_bcc_maps_including_null_sender with this content :
<>      BCC     au...@example.org <mailto:au...@example.org>

Do you agree ?

Alexandre

Reply via email to