On 12/2/21 3:14 pm, Viktor Dukhovni wrote:
Hi, I have a fairly typical postfix install with port 465 requiring
authentication. I'd like to allow one sender (email address or IP) to
inject email on port 465 without providing login/password authentication.

The port number and TLS encryption are irrelevant here, all that
matters, is that "restrictions" you configure for the SMTP service
in question. [...]

Thank you Viktor. A week of agonizing google searches and testing came down
to something so simple. I actually put all this in main.cf to accept unauth
messages from a nominated remote postfix server...

smtp_tls_security_level = encrypt
smtp_tls_wrappermode = yes
mua_relay_restrictions = permit_sasl_authenticated
    check_client_access cidr:/etc/postfix/mua-client.cidr reject
smtpd_relay_restrictions = $mua_relay_restrictions

~ cat mua-client.cidr
12.34.56.78/32    OK

And then used this to push messages TO that server which has a reciprocal
setup...

transport_maps = lmdb:/etc/postfix/transport

~ cat transport
remote.domain smtp:[78.56.34.12]:465

The reason for wanting this setup is that I've started using delta.chat
with a few friends and I want to maximize the speed between our mailservers
and also try to minimize the size of the messages to sometimes <1500 bytes.

FWIW disabling DKIM seems to make the biggest difference...

~ grep DontSignMailTo /etc/opendkim.conf
DontSignMailTo          user1@remote.domain, user2@remote.domain

and why not SPF while we're at it...

~ cat sender_checks (.lmdb)
remote.domain OK

Is there any other magic I could use in this peer-to-peer scenario to reduce
the number of unnecessary headers during transit on a per domain basis?

Reply via email to