So much for keeping our company domain off of the postfix mailling lists, LOL.  
Redacting moving forward.

Rather than try to reply to every point you cited, let me start over:

Our process to send to this list would do the following:

Construct an email like this:

To: support-st...@dayjob.org
From: Support Staff <support-st...@dayjob.org>
BCC: internal-al...@dayjob.org

And then, in our delivery maps, we map:

internal-al...@dayjob.org to support-contacts-someno...@support.dayjob.org 

(where our internal rt instance lives), with an :include: of a 
periodically-generated file generated by our ticket system.

Because we do not want the customer list in our recipients, we rely on the BCC 
mechanism.  This has worked pretty much flawlessly for years with two problems:

1) We wanted the address that was bcc'd to be "secret" (and security through 
obscurity is bad, but any real security postfix could offer us (checking the 
sender?) could be easily spoofed as well.  The overhead of making an address 
internally-deliverable only is complicated: the RT machine *needs to accept 
mail*.

2) This weirdness.

These original mailing lists (on the "support" system did not have the 
additional support-contacts-somenonce-owner: alias present.

Whatever expanded that internal list, was leaking that somewhere into the 
headers.

Looking at the internal bounce I got back from Office365, I see that the 
message made it *somewhere* into the bowels of o365 before being rejected, but 
the headers don't have the usual "for" line.

Received: from BN9PR03CA0876.namprd03.prod.outlook.com (2603:10b6:408:13c::11)
 by SJ0P105MB0302.NAMP105.PROD.OUTLOOK.COM (2603:10b6:a03:2fd::12) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5986.18; Tue, 10 Jan
 2023 19:08:20 +0000
Received: from BN8NAM12FT017.eop-nam12.prod.protection.outlook.com
 (2603:10b6:408:13c:cafe::77) by BN9PR03CA0876.outlook.office365.com
 (2603:10b6:408:13c::11) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5986.18 via Frontend
 Transport; Tue, 10 Jan 2023 19:08:20 +0000
Authentication-Results: spf=pass (sender IP is 149.20.64.53)
 smtp.mailfrom=dayjob.org; dkim=pass (signature was verified)
 header.d=dayjob.org;dmarc=pass action=none header.from=dayjob.org;compauth=pass
 reason=100
Received-SPF: Pass (protection.outlook.com: domain of dayjob.org designates
 149.20.64.53 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.20.64.53; helo=mx.pao1.dayjob.org; pr=C
Received: from mx.pao1.dayjob.org (149.20.64.53) by
 BN8NAM12FT017.mail.protection.outlook.com (10.13.182.170) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.6002.11 via Frontend Transport; Tue, 10 Jan 2023 19:08:19 +0000
Received: from support.dayjob.org (support.dayjob.org [IPv6:2001:4f8:1:f::43])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256)
(Client did not present a certificate)
by mx.pao1.dayjob.org (Postfix) with ESMTPS id 94D313AB02F;
Tue, 10 Jan 2023 19:08:17 +0000 (UTC)

I should note that we have several users using o365 and only got one bounce, 
and I'm not sure what deep inspection they're doing.  They are an opaque box.

I'm going to spin up both testing-with-owner-aliases and 
testing-without-owner-aliases that use the same mail flow, and see if I can 
narrow down the problem-set, but something's not right.

My actual question of "is there a mailing list engine that *just* handles a 
tiny subset of what a full-blown mailman does (no cgi, no membership 
management, some basic body tagging perhaps)" remains unanswered and I can't 
believe that such an animal doesn't exist.  This is exactly the featureset we'd 
get with some kind of ESP, except in-house.

-Dan


Reply via email to