Hi, On Mon, Dec 28, 2015 at 12:17 AM, Bill Cole <postfixlists-070...@billmail.scconsult.com> wrote: > On 27 Dec 2015, at 22:48, Alex wrote: > >> Hopefully the smtpd_sender_restrictions I posted above is correct, but >> I will also have to either add the IPs to mynetworks or duplicate the >> check_sender_access map in smtpd_recipient_restrictions to avoid being >> rejected in the RBLs there, correct? > > If you are not willing to put the IPs in mynetworks, I would still urge you > to NOT use check_sender_access to whitelist sources that you can identify > purely by IP or reliably resolvable domain name (i.e. "client" identities). > It's trivial to forge a sender address and you should avoid extending trust > based on such a weak identification. On the other hand, it is a complex > trick to hijack an IP address for a TCP-based protocol like SMTP or > hijack/spoof DNS for a client hostname that Postfix would deem valid. So a > check_client_access map dedicated solely to protecting those servers from > DNSBLs would be a better choice in smtpd_recipient_restrictions.
I didn't previously explain that there is one host that I know for sure doesn't resolve. It wasn't so much that I didn't want to add the IPs to mynetworks. I also really wanted to learn how it sender maps worked. I thought of the mynetworks solution as an "all access pass", but now I understand why it's more secure than the sender maps. >> smtpd_recipient_restrictions = > > [...] >> >> check_sender_access hash:/etc/postfix/sender_access, >> reject_unauth_destination, > > In any case, those two should never be in that order if the > check_sender_access map has any OK actions. Thanks so much for your help. Alex