for the blackhole lists, etc. take a look ar mxtoolbox.com postfix should be passing sasl requests to dovecot’s imap process. I use a tool called ispconfig which sets all of this up along with other tools such as clamav, rspamd or amavisd along with per user policies.
my $0.02. I like its security way better than cpanel. it’s closer to plesk in that regard. best of all it’s free. Sent from my iPhone > On Jan 24, 2021, at 6:43 AM, Jeff Abrahamson <j...@p27.eu> wrote: > > > I've set up a new postfix instance which more or less duplicates an older > one. The main change (besides being newer) is that the old one used real > users with real accounts while this one uses virtual users. Some bits work, > some don't. I'm a bit confused on how to test it, really, short of > connecting with a regular email client (mutt, thunderbird, etc.). > > But I've a few questions, mostly about auth, which is what has most changed > and which I've clearly not got going correctly. (And I'm aware that auth may > be handled by dovecot and so not be appropriate to this list. But I'm not > yet convinced of that, so I have to ask here first.) > > 1. Users need to provide user + password to send (smtps) and receive > (imaps). I see where I've configured this for dovecot, which is > /etc/dovecot/passwd.db. That file contains lines like this: > > j...@mobilitains.fr:{BLF-CRYPT}$2y$05$c... > > I do not see how postfix knows who is allowed to connect, however. Does > postfix delegate SASL to dovecot? This is the relevant config, I think: > > [T] jeff@nantes-m1:log $ postconf -n | grep -i sasl > broken_sasl_auth_clients = yes > smtpd_recipient_restrictions = > reject_unknown_client_hostname,reject_unknown_sender_domain,reject_unknown_recipient_domain,permit_mynetworks,permit_sasl_authenticated,reject_unauth_destination,reject_invalid_hostname,reject_non_fqdn_sender > smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated > defer_unauth_destination > smtpd_sasl_auth_enable = yes > smtpd_sasl_authenticated_header = yes > smtpd_sasl_local_domain = > smtpd_sasl_path = private/auth > smtpd_sasl_security_options = noanonymous > smtpd_sasl_type = dovecot > > [T] jeff@nantes-m1:log $ postconf -Mf > smtp inet n - y - - smtpd > submission inet n - y - - smtpd > -o syslog_name=postfix/submission > -o smtpd_tls_security_level=encrypt > -o smtpd_sasl_auth_enable=yes > -o smtpd_client_restrictions= > -o smtpd_helo_restrictions= > -o smtpd_sender_restrictions= > -o smtpd_recipient_restrictions= > -o smtpd_relay_restrictions=permit_sasl_authenticated,reject > -o milter_macro_daemon_name=ORIGINATING > smtps inet n - y - - smtpd > -o syslog_name=postfix/smtps > -o smtpd_tls_wrappermode=yes > -o smtpd_sasl_auth_enable=yes > -o smtpd_reject_unlisted_recipient=no > -o smtpd_client_restrictions= > -o smtpd_helo_restrictions= > -o smtpd_sender_restrictions= > -o smtpd_recipient_restrictions= > -o smtpd_relay_restrictions=permit_sasl_authenticated,reject > -o milter_macro_daemon_name=ORIGINATING > ... > > 2. Any suggestions on how to test this (and continue testing it)? First, > about today, as in, are there good commandline tools to poke at a postfix > instance? > > Second, for later, I'm aware of some very useful online web-based tools > (mxtoolbox, etc.), but I'd be quite happy to have some process run on another > host and periodically check that my MX isn't on any blackhole lists, that the > reasonably foreseeable stuff is all working correctly, etc. I've not found > that. Any suggestions? > > Many thanks for any pointers. > > -- > Jeff Abrahamson > +33 6 24 40 01 57 > +44 7920 594 255 > > http://p27.eu/jeff/ > http://transport-nantes.com/