> @lbutlr wrote:
>> > a wrote:
>> > > However, an outside network can still identify as a local email
>> > > account to send into my network, making imposters possible.
>> >
>> > Do not allow connections on port 25 that claim to be from your domains.
>> >
>> > (I think this works still):
>>
>> Yes.
> @lbutlr wrote:
> > a wrote:
> > > However, an outside network can still identify as a local email
> > > account to send into my network, making imposters possible.
> >
> > Do not allow connections on port 25 that claim to be from your domains.
> >
> > (I think this works still):
>
> Yes. It work
On 20/02/2020 03:39, Bob Proulx wrote:
> I do a slight variation on this that I think is slightly better.
> Instead of pcre tables I use hash tables. Which should be slightly more
> efficient. And won't suffer from common substring matches such as
> hitting by accident on goodkreme.com or othe
@lbutlr wrote:
> a wrote:
> > However, an outside network can still identify as a local email
> > account to send into my network, making imposters possible.
>
> Do not allow connections on port 25 that claim to be from your domains.
>
> (I think this works still):
Yes. It works.
> smtpd_helo_
On 18 Feb 2020, at 13:48, a wrote:
> I looked around online to try to see examples to stop this but haven't found
> any yet. Maybe I'm missing something simple.
>
> My postfix server does allow incoming connections from the outside world to
> deliver mail to mailboxes on my server which is wha