On 2021-07-02 21:37, Phil Stracchino wrote:
main.cf:
smtpd_sender_restrictions = permit_mynetworks
...
check_sender_access lmdb:/etc/postfix/sasl_authenticated
whould be check_sasl_accesss imho
check_sender_access lmdb:/etc/postfix/block-l
On 2021-07-02 at 10:46:07 UTC-0400 (Fri, 2 Jul 2021 16:46:07 +0200)
Marek Kozlowski
is rumored to have said:
:-)
I'd like to disable any mail from 'my.domain' from external networks
and non authenticated users. For envelope addresses my solution works
and is as follows:
At first bind valid
On 7/2/21 11:05 AM, Marek Kozlowski wrote:
> :-)
>
> On 7/2/21 5:02 PM, post...@ptld.com wrote:
>>
>> Do you mean this literally? Stopping me from sending an email using my
>> mail server that claims to be from 'your.domain'?
>> You can't, you can only publish SPF records and hope the receiving m
On 2021-07-02 17:22, post...@ptld.com wrote:
Am i wrong and the from= is actually the envelope
from or is it checking against the from address?
this is check_policy_service not reject_sender_login_mismatch
Are you sure? The documentation only mentions the MAIL FROM address.
Oops, my last reply was on SPF receiving and now i see you were talking
about sending out login mismatched.
My understanding is that it verifies the from and not just the envelope
from, but if im wrong id like to know.
On 07-02-2021 11:13 am, Damian wrote:
reject_sender_login_mismatch can be setup to only allow emails being
sent out where the from, not just the envelope-from, has to match the
users login credentials
Are you sure? The documentation only mentions the MAIL FROM address.
I think im sure. Here
On 2021-07-02 17:14, Marek Kozlowski wrote:
For some reasons I'd like not to apply restrictive SPF checking. For
envelopes my simple solution works perfectly without SPF. How about
internal "from:"
milters is needed for this one
reject if from is local not signed, but this is breaked by maill
:-)
On 7/2/21 5:10 PM, post...@ptld.com wrote:
OK, small clarification:
I'd like to disable any mail from 'my.domain' from external networks
and non authenticated users...
...delivered to my users.
Making sure i understand, you are saying you want to stop me from using
my mail server from s
On 2021-07-02 17:05, Marek Kozlowski wrote:
I'd like to disable any mail from 'my.domain' from external networks
and non authenticated users...
...delivered to my users.
basicly all local senders in recipient maps is forged senders on port 25
?
easy to fix :=)
with postfixadmin:
check_se
reject_sender_login_mismatch can be setup to only allow emails being
sent out where the from, not just the envelope-from, has to match the
users login credentials
Are you sure? The documentation only mentions the MAIL FROM address.
OK, small clarification:
I'd like to disable any mail from 'my.domain' from external networks
and non authenticated users...
...delivered to my users.
Making sure i understand, you are saying you want to stop me from using
my mail server from sending an email to one_of_your_users@your.domain
:-)
On 7/2/21 5:02 PM, post...@ptld.com wrote:
Do you mean this literally? Stopping me from sending an email using my
mail server that claims to be from 'your.domain'?
You can't, you can only publish SPF records and hope the receiving mail
server of the spoofed email rejects it based on those
I'd like to disable any mail from 'my.domain' from external networks
Do you mean this literally? Stopping me from sending an email using my
mail server that claims to be from 'your.domain'?
You can't, you can only publish SPF records and hope the receiving mail
server of the spoofed email reje
:-)
I'd like to disable any mail from 'my.domain' from external networks and
non authenticated users. For envelope addresses my solution works and is
as follows:
At first bind valid addresses with their owners:
Precisely:
smtpd_sender_restrictions =
check_sender_acces ...
c
:-)
I'd like to disable any mail from 'my.domain' from external networks and
non authenticated users. For envelope addresses my solution works and is
as follows:
At first bind valid addresses with their owners:
smtpd_sender_restrictions =
...
reject_sender_login_mismatch,
15 matches
Mail list logo