Hello,

I just wanted to provide a feedback with the resolution to our problem.

Your hint Wietse was the key ;)

"Simplify the configuration: place check_policy_service at the start
of your rules."

The problem was in the location of the "check_policy_service 
unix:private/policyd-spf" in our Postfix configuration... we located it at the 
very bottom of the "smtpd_recipient_restrictions", so incoming emails where 
never evaluated by the check, except some...

smtpd_recipient_restrictions =
  check_client_access cidr:/etc/postfix/mynetworks3.cidr,
  reject_unauth_pipelining,
  check_sender_access hash:/etc/postfix/acl-1-from,
  check_recipient_access hash:/etc/postfix/acl-1-to,
  check_sender_access regexp:/etc/postfix/acl-2-from,
  check_sender_access hash:/etc/postfix/fromreg,
  check_recipient_access hash:/etc/postfix/toreg,
  permit_mynetworks,
  permit_sasl_authenticated,
  reject_unauth_destination,
#  check_policy_service inet:127.0.0.1:10023,
  check_policy_service inet:127.0.0.1:10022,
  check_policy_service unix:private/policyd-spf

So after locating it a bit higher, now all incoming emails are processed by the 
policy and therefore the correspondent SPF header is added to the emails.

Thank you very much for your help and regards,
 
eNeKuX
 
 

Sent: Tuesday, June 07, 2016 at 4:23 PM
From: "Wietse Venema" <wie...@porcupine.org>
To: "Postfix users" <postfix-users@postfix.org>
Subject: Re: Problems with SPF policy service (pypolicyd-spf)
Wietse Venema:
> Have you looked in the MAILLOG file for warning/error/fatal/panic
> messages as a result of doing these experiments? Postfix does not
> silently drop requests.

Simplify the configuration: place check_policy_service at the start
of your rules.

How do you measure the number of check_policy_service requests?
Note that syslog etc. may drop records when events are logged at a
high rate.

Wietse

Reply via email to