On 4/15/22 10:15 AM, Matus UHLAR - fantomas wrote:
On 14.04.22 08:26, Emmett Culley wrote:
I recently changed the host name of one of the servers from one domain I am 
hosting to another of the domains the server is serving.

Upon verifying the server I noticed that the Received: headers on email sent 
via that server now have the new host name

This is completely irelevant to mail processing, unless the new mail server's 
name does not exist in DNS, or has a SPF record that disqualifies the server 
from announcing itself.

and so causes Thunderbird to show the from address in red for emails from 
domains that are different from the server's hostname.

Sorry, I have no idea what you are talking about. Can you provide a screenshot 
somehow?

Is there anything I can do to specify that the Recieved: headers have the 
"correct" domain name depending on what domain is sending an email (From:)?

you do not need this. your problem apparently
I have DKIM working in such a manner.  When an email is sent for domain.one 
(From: domain.one) the dkim signature contains the signature for domain.one and 
if sent for domain.two (From: domain.two) it contains the dkim signature for 
domain.two.  No matter what the server's hostname is set to.

I guess I am asking if there is any way to map the sending domain written to 
the header (From.: domain.tld) to the domain the email was sent as? Similar to 
how opendkim does when choosing the DKINM signature to add to the outgoing 
email's header.

the domain in From: should be the one you or other senders have configured in 
thunderbird or other mail clients, and is not related to the mail server's name.
This was caused by a missed configuration with my mail server's openDKIM 
configuration.  Thanks for the clue.

On 4/14/22 9:58 AM, Wietse Venema wrote:
The Received: headers contain the value of the "myhostname" parameter,
i.e.  the identity of this Postfix MTA instance. This name should
match the IP address where the MTA sends and receives mail.

Postfix can send and receive email on behalf of many domains. Email
is not like HTTP, and there is no requirement that the Postfix MTA
identity matches the name of every domain that it handles mail for.
But it is supported ever since Postfix got SNI support a few years
ago.

On 14.04.22 10:02, Emmett Culley wrote:
Thanks Wietse.  I will study up on SNI.  I am working on new servers with 
RockyLinux 8 and so will also be using a newer version of postfix.

SNI is only used when you connect to the server to send or receive
e-mail, and your customers have multiple servernames configured in their
mail clients.

If you have @example.com domain address and connect to mail.example.com, you
only need SNI if other users with @example.net address use mail.example.net
on the same server.  This way, if you have separate certificates for
mail.example.com, mail.example.net etc, you need SNI.

If you have single certificate with alternative names mail.example.com,
mail.example.net etc, you do NOT need SNI.

Usually, people use mail.example.org as smtp/imap/pop3 server and
use @example.com or @example.net addresses, and server only needs
certificate for mail.example.org.

I see that I was concerned about nothing, simply because thunderbird had a working DKIM 
checker.  I had assumed it was a misconfiguration on the mail server that was causing the 
warning.  It wasn't until I looked a the header source for those emails that looked 
"bad" that I found they did not have a dkim signature.

They all relay via my main servers and the "bad" one's were not listed in the 
opendkim trustedhosts file on those servers, and so no DKIM signature was added upon 
relay for those servers.

Emmett


Reply via email to