Viktor Dukhovni:
> 
> 
> > On Dec 29, 2017, at 11:51 AM, Wietse Venema <wie...@porcupine.org> wrote:
> > 
> > I think the biggest break is smtpd_relay_restrictions because that
> > was introduced before the compatibility_level safety net. You may
> > have to explictly set smtpd_relay_restrictions to empty.
> 
> The default is:
> 
>    smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated, 
> defer_unauth_destination
> 
> Typically, it is sufficient to set:
> 
>    smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated, 
> reject_unauth_destination
> 
> and then optionally adjust smtpd_recipient_restrictions to eliminate the
> resulting duplication.  You can of course continue to use just the latter,
> and set the former empty as noted by Wietse.

We could still cover smtpd_relay_restrictions under the compatibility
safety net, meaning that this log a warning if smtpd_relay_restrictions
would defer/reject mail and compatibility_level <1.

I don't think that would break anything.

        Wietse

Reply via email to