On Tue, Aug 30, 2022 at 11:27:19AM +0000, Frank Brendel wrote:

> > Are you using MailScanner or other non-Postfix software that
> > reads or updates Postfix queue files?
> >
> >         Wietse
> 
> No, only Postfix and Dovecot with replication.  I've attached the
> postconf output.
> 
> But regarding 'queue files' I have about 265.000 deferred mails
> (recipients mailbox full).

You really should do something about that, build a table of over-quota
recipients, and tempfail new mail for such users when briefly over
quota, and ultimately reject if long-term over-quota.

If the users don't resolve this condition, you'll be sending over a
quarter million bounces.  This is likely a bigger issue that the
occasional corrupt message.

> Filesystem is UFS2.

To make progress, you'll need detail the milters you're using, and share
complete logs and make available the raw binary queue file for at least
one corrupt spammy message with sufficiently non-sensitive content.
Please also report:

    $ postconf mail_version

and whether you're running Postfix from base or ports.  Also
the OS release and patch level, and if from ports the package
version.

> header_checks = pcre:/etc/postfix/header_checks.pcre
> milter_default_action = accept
> milter_mail_macros = i {mail_addr} {client_addr} {client_name} {auth_authen}
> milter_protocol = 6
> smtpd_helo_restrictions = permit_mynetworks,
>   permit_sasl_authenticated, check_helo_access
>   pcre:/etc/postfix/helo_exceptions.pcre, reject_non_fqdn_hostname,
>   reject_invalid_helo_hostname, check_helo_access
>   pcre:/etc/postfix/helo_checks.pcre, permit
> smtpd_recipient_restrictions = reject_non_fqdn_recipient,
>   reject_unknown_recipient_domain, permit_mynetworks,
>   permit_sasl_authenticated, reject_unauth_destination,
>   reject_unlisted_recipient, check_recipient_access
>   pcre:/etc/postfix/whitelist_checks.pcre permit
> smtpd_sender_restrictions = permit_mynetworks,
>   permit_sasl_authenticated, reject_non_fqdn_sender, check_sender_access
>   pcre:/etc/postfix/sender_checks.pcre reject_unknown_sender_domain,
>   permit

Do the header_checks and/or restrictions affect which if any milters are
ultimately used?  Under what conditions?

> notify_classes = software

On a high-volume mail servers, I recommend empty notify_classes, and
monitor your logs instead.

> smtpd_milter_maps = cidr:/etc/postfix/smtpd_milter.map
> smtpd_milters = inet:aaaaaa.aaaaaaa.aaa:dddd

Which milters are expected to have been used with the corrupt messages?

-- 
    Viktor.

Reply via email to