Viktor Dukhovni: > > > > On Dec 29, 2017, at 11:51 AM, Wietse Venema <wie...@porcupine.org> wrote: > > > > I think the biggest break is smtpd_relay_restrictions because that > > was introduced before the compatibility_level safety net. You may > > have to explictly set smtpd_relay_restrictions to empty. > > The default is: > > smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated, > defer_unauth_destination > > Typically, it is sufficient to set: > > smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated, > reject_unauth_destination > > and then optionally adjust smtpd_recipient_restrictions to eliminate the > resulting duplication. You can of course continue to use just the latter, > and set the former empty as noted by Wietse.
We could still cover smtpd_relay_restrictions under the compatibility safety net, meaning that this log a warning if smtpd_relay_restrictions would defer/reject mail and compatibility_level <1. I don't think that would break anything. Wietse