To postfix in particular i dont know, but a have ITIL and COBIT books for
generic enviroments IT.



2016-09-29 2:32 GMT-03:00 Bill Cole <
postfixlists-070...@billmail.scconsult.com>:

> On 28 Sep 2016, at 10:58, Stephen Satchell wrote:
>
> For PostFix in particular?
>> For mail servers in general?
>>
>
> Nothing definitive, comprehensive, and usefully detailed because the world
> at large cannot tell you who you are. RFC5321 covers the technical details
> of SMTP well, but there are behaviors that it recommends which are widely
> unsupported and others it strongly discourages which are widely practiced.
>
> Postfix is an extremely versatile tool. The specific tasks one applies
> that tool to varies widely and what results are desired does as well.
> Consider that there is over a megabyte of text in the Postfix README text
> files, over a megabyte of man page content in 177 files, and 'man 5
> postconf' alone puts out over 650KB of text. There are 877 top-level
> configuration items in the default Postfix configuration and it is common
> for admins to have a use for adding a handful to scores of custom config
> items like restriction classes and per-instance settings, particularly in
> complex environments. A typical *simple* site is likely to change scores of
> those 877 to meet local needs. Watch this list for a week or two and you
> will see experienced professional mail admins recommending starkly
> different configurations to neophytes, with none of them being objectively
> wrong. If you factor out all of the matters of opinion and all of the
> variables that differ between sites, you get a very short and basically
> useless set of best practices:
>
> 1. Deliver all legitimate email to the right places.
> 2. Do not deliver spam or any other species of email which is intended or
> likely to harm recipients.
> 3. Minimize delays.
> 4. Minimize resource demands. This includes bandwidth, hardware, AND
> wetware (that's actual humans, which are costly to operate and maintain).
> 5. Minimize dependence on the resources and services of others,
> particularly those with no contractual obligation to perform for you. See
> Brian Krebs' recent Akamai experience for a demo of this issue in the area
> of web DDoS mitigation. Note that neither Brian nor Akamai did anything
> wrong.
> 6. Minimize the ability of legitimate email to vanish silently while
> simultaneously minimizing the ability of illegitimate email to generate
> backscatter originating on your systems.
> 7. Maximize the happiness of your users and email service peers with your
> handling of email.
> 8. Follow technical standards such as RFC5321 and RFC5322 as closely as
> you can while prioritizing items 1-7.
> 9. Balance the fulfillment of items 1-8 with the realities of technical
> and personnel availabilities and costs to optimize the sustainability of
> your mail system.
> 10. Don't screw around with your users' email content. Deliver or reject,
> quarantine or "spam folder" if they insist, but leave what's inside alone
> as much as is possible. It's OK if you can't do total binary transparency
> and so need to re-encode, but don't go whacking MIME parts you deem
> dangerous while delivering the rest or encapsulating/defanging dangerous
> messages but delivering them anyway.
>
> How do you do all those things? Well, that depends on many variables...
> Who are you? *You* have to answer that. The answer has to include who your
> users are and how they can be made happy. Hence, it also has to include who
> they want to exchange email with and who they will tolerate being unable to
> exchange email with seamlessly.
>



-- 
Atenciosamente,
Rodrigo da Silva Cunha

Reply via email to