Wow !! how many answers. First to deep into matter i want give the thanks you 
to all. While i was reading (and read all answers)i was taking note of some 
items that require my answer o clarification. 
1) My topology
1.0)My server is in my office phisically and is located at 1 meter of me (3ft)
1.1)My connection topology is
internet <-public ip-> my server schweb <-internal ip-> my computer with mua. 
So my email password never touch internet.
1.2)Fail2ban, i have fail2ban to ban permanently (even if reboot) the 
bruteforce attacks
1.3) Have not ssh,ftp or any login from outside open the only administration 
way is inside of my office.
1.4) I have not administration sowftware ( webmin and etc)
1.5) The passwords are in userDB format with root owned file and cannot be 
changed with any frontend, only root ( with real acess to my office)

2)Dear Kevin:
I think that the sender dont know my password because do not identify SASL 
loocking the logfile /var/log/mail
Postfix managed the email as regular incoming email.

3)Dear Andrei
>mmu.ac.ug.      86400   IN  TXT "v=spf1 include:_spf.google.com ~all"
>See, ~all was your undoing.
My domain is **schweb.com.ar** and the email come from **mmu.ac.ug**
My spf is:
v=spf1 mx a ip4:24.232.174.73 mx:schweb.com.ar a:schlabs.com.ar 
a:sys-arquitectura.cl -all
Maybe i need remove -all?


4)I perform the check on https://haveibeenpwned.com/
Good news — no pwnage found!

5)I add the missing part of log at end of email

6)SpamAssasin, i never used. I will read how install it. Normally i block the 
entire ISP when i receive a spam, scam, pishing email.

7) "@lbutlr" 
About /etc/postfix/sender_access.pcre, Thanks you i will do 

8) Dear Mick: header checks
I will test, i cannot close the port 25 because my sister use it and she lives 
in other country ( i am on Argentine she is in Chile).
I will look for use only for incoming emails

9) i have configured to block words like BIT COIN (all together), but the 
email was base64 coded and postfix cant decrypt and check the content. Is 
possible?

Best Regards 
Christian

Anex 1:
2019-03-22T07:41:56.930185-03:00 schweb postfix/smtpd[16228]: connect from 
mmu.ac.ug[62.75.235.12]
2019-03-22T07:41:57.912905-03:00 schweb postfix/smtpd[16228]: Anonymous TLS 
connection established from mmu.ac.ug[62.75.235.12]: TLSv1.2 with cipher 
ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)
2019-03-22T07:42:00.178966-03:00 schweb postfix/policy-spf[16235]: : SPF 
softfail (Mechanism '~all' matched): Envelope-from: d...@mmu.ac.ug
2019-03-22T07:42:00.180439-03:00 schweb postfix/policy-spf[16235]: handler 
sender_policy_framework: is decisive.
2019-03-22T07:42:00.181631-03:00 schweb postfix/policy-spf[16235]: : Policy 
action=PREPEND Received-SPF: softfail (mmu.ac.ug: Sender is not authorized by 
default to use 'd...@mmu.ac.ug' in 'mfrom' identity, however domain is not 
currently prepared for false failures (mechanism '~all' matched)) 
receiver=schweb; identity=mailfrom; envelope-from="d...@mmu.ac.ug"; 
helo=xray144.theg7.com; client-ip=62.75.235.12
2019-03-22T07:42:01.651477-03:00 schweb postfix/smtpd[16228]: 9EE12450F4: 
client=mmu.ac.ug[62.75.235.12]
2019-03-22T07:42:01.895647-03:00 schweb postfix/cleanup[16242]: 9EE12450F4: 
message-id=<5s5jp2.2trzrx165hrq...@mail.mmu.ac.ug>
2019-03-22T07:42:05.367192-03:00 schweb postfix/qmgr[32549]: 9EE12450F4: 
from=<d...@mmu.ac.ug>, size=228789, nrcpt=1 (queue active)
2019-03-22T07:42:05.604239-03:00 schweb postfix/smtpd[16228]: disconnect from 
mmu.ac.ug[62.75.235.12]
2019-03-22T07:42:06.429100-03:00 schweb postfix/virtual[16247]: 9EE12450F4: 
to=<l...@schweb.com.ar>, relay=virtual, delay=8, delays=6.9/0.02/0/1, 
dsn=2.0.0, status=sent (delivered to maildir)
2019-03-22T07:42:06.431609-03:00 schweb postfix/qmgr[32549]: 9EE12450F4: 
removed

-- 
Be Free, Be Linux       

Reply via email to