>
>
> Is there any security benefits to creating this smart host as a separate
> SMTP server?  Are there any "best practices" for this kind of situation?
>

It depends on your network structure and how much do you trust your new
clients.

If your client resides directly at your local network (either physical or
VPN) you can use
"mynetworks" to allow relaying. This is a typical config for SOHO

If no, then you should use SASL to auth the client.
Be sure to force TLS ( smtpd_tls_auth_only) in this case.
You can also enable client certificate verification (see TLS_README) to
make the system even more secure.
Also, use "smtpd_sender_login_maps" to make sure client uses only allowed
"From".

But if you want to delegate the management of your clients to someone who
doesn't have access to your MTA, then you can
install separate "relayhost" for them and give the appropriate person
rights to manager authentication, generic, canonical and other things.

Some untrusted clients should never send email anywhere except one/two
well-known addresses.
This could be done with regex-based virtual(5), and it could be convenient
to configure it on the separate server not to pollute your MTA.

There are some "dumb" SMTP clients that can't use SMTP AUTH nor TLS. If you
want  such client to be connected to your MTA via the public Internet,
then you have to install "relayhost" for it

Tell us more about the problem you are trying to solve.



>

Reply via email to