> On May 21, 2022, at 8:03 AM, Viktor Dukhovni <postfix-us...@dukhovni.org> 
> wrote:
> 
> On Sat, May 21, 2022 at 12:09:37AM -0700, Jeremy Hansen wrote:
> 
>> What I experience when the port forward is enabled is suddenly
>> “things” out there are attempting to just email random addresses at
>> the AWS instance hostname.
> 
> You don't have to accept such mail, or if you, you don't have to forward
> it to the internal system behind the SSH port forward.  And if
> nevertheless you do, you can arrange to not forward it back from the
> internal MTA.
> 
>> http://skidrowstudios.com/mta/cmx01-logs.txt
> 
> Post all relevant data in the body of your message, I am not inclined to
> chase them down by switching to a web browser.

I tried.  The mail list rejected my messages since it was too many characters.

> 
> Loop breaking is simply a matter of knowing which system is responsible
> for final delivery of a given message recipient.

This is actually what I expected to happen but since the Ciphermail host (This 
is just postfix with some filters to gpg encrypt all incoming mail if a key is 
available for the destination user.  
https://gitlab.com/ciphermail/ciphermail-community).


> 
> Don't forward mail that for which the input MTA is expected to be the
> final destination.

That sounds logical.  I’m not sure why it’s even forwarding the mail since that 
user or domain is not defined to accept that mail.

> 
> --
>    Viktor.

-jeremy

Attachment: signature.asc
Description: Message signed with OpenPGP

Reply via email to