Jaroslaw Rafa wrote in
 <20230112205215.ga28...@rafa.eu.org>:
 |Dnia 12.01.2023 o godz. 13:49:33 post...@ptld.com pisze:
 |> My solution...
 |>
 |> main.cf:
 |>     smtp_header_checks = pcre:/etc/postfix/header_checks_smtp
 |>
 |>
 |> /etc/postfix/header_checks_smtp:
 |>     /^Received:/           IGNORE
 |>     /^X-Originating-Ip:/   IGNORE
 |
 |If you do it in master.cf for submission services only, it my be OK. But as

It definetely does not work.  It only works for smtp not smtpd.
Also message_drop_headers+=.  I now have disabled relay from the
outside completely and spawn a in-VPN-only-submission

  192.0.2.1:submission inet n -   n       -       -       smtpd
          -o syslog_name=vpnsubmission
          -o smtpd_sasl_auth_enable=no
          -o 
smtpd_relay_restrictions=permit_mynetworks,reject_unauth_destination

As this listens only on the VPN (a veth(4) endpoint into an ip(8)
netns that only routes via WireGuard), i neither use TLS for
another layer of transport security nor SASL or TLS client
certificates for authentification (since any postfix server member of the VPN
that relayhost= through the VPN would anyway be able; i still have
the certificates though, from my former approach).
I was not able to remove the Received:.

One more process listening around, what overkill for my purpose
(and only permit_mynetworks is the change in :smtp).

 |a general default in main.cf it's definitely wrong. You strip all Received:
 |headers from all incoming mail, thus you are unable to investigate the
 |details in case of any mail problems (eg. you are receiving spam or \
 |messages
 |with fake sender address).

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

Reply via email to