Postfix has sane defaults for all parameters, so the text shows only the overrides. In particular, Postfix will relay mail only for clients in its own domain (and subdomains) and in its class A, B or C networks. The master.cf file (somewhat like inetd.conf) needs tweaking only if you have a very slow or a very fast net/machine.
Workstation:
/etc/postfix/main.cf: myorigin = $mydomain
Server:
/etc/postfix/main.cf: myorigin = $mydomain mydestination = $myhostname, localhost.$mydomain, $mydomain
In an environment like this. either the mail spool directory is shared via NFS, users access their mailboxes via POP, or each user receives her mail on her own workstation. In the latter case, each user has an alias on the server that forwards mail to the respective workstation:
Server:
/etc/aliases: joe: joe@joes.workstation jane: jane@janes.workstation
On some systems the alias database is not in /etc/aliases. To find out the location for your system, execute the command postconf alias_maps.
In the following example, mail is sent as user@domain, and all mail is forwarded to the mail server that is responsible for the local domain.
/etc/postfix/main.cf: myorigin = $mydomain relayhost = $mydomain /etc/postfix/master.cf: Comment out the SMTP server entry Comment out the local delivery agent entry
Since everything sends mail as user@domain, nothing sends mail as user@nullclient, and therefore no special configuration needs to be done on the mail server for mail addressed to user@nullclient.
/etc/postfix/main.cf: myorigin = $mydomain
/etc/postfix/main.cf: relayhost = $mydomain
This assumes that your organization has set up internal MX records for the local domain.
If your intranet does not use MX records internally, you have to specify the intranet mail gateway host itself:
/etc/postfix/main.cf: relayhost = host.my.domain
If your intranet does not use DNS internally, you have to disable DNS lookups as well:
/etc/postfix/main.cf: disable_dns_lookups = yes
Specify routing information for the internal domain in the transport table, and enable transport table lookups.
/etc/postfix/transport: my.domain smtp: .my.domain smtp: thishost.my.domain local: !!!important!!! localhost.my.domain local: !!!important!!! /etc/postfix/main.cf: transport_maps = hash:/etc/postfix/transport
Important: do not omit the entries that deliver mail locally, or else mail will bounce with a "mail loops to myself" condition.
Specify dbm instead of hash if your system uses dbm files instead of db. To find out what map types Postfix supports, use the command postconf -m.
Execute the command postmap /etc/postfix/transport whenever you edit the transport table.
How to set up Postfix on the firewall machine so that it relays mail for domain.com to a gateway machine on the inside, and so that it refuses mail for *.domain.com? The problem is that the default relay_domains mail relaying restriction allows mail to *.domain.com when you specify domain.com.
Specify explicit settings for smtpd_recipient_restrictions and for mynetworks that allow local systems to send mail anywhere, and that allow remote systems to send mail only to user@domain.com.
/etc/postfix/main.cf: myorigin = domain.com mydestination = domain.com transport_maps = hash:/etc/postfix/transport mynetworks = 12.34.56.0/24 smtpd_recipient_restrictions = permit_mynetworks reject_unauth_destination /etc/postfix/transport: domain.com smtp:inside-gateway.domain.com (forwards user@domain) /etc/postfix/master.cf: Comment out the local delivery agent
Specify dbm instead of hash if your system uses dbm files instead of db. To find out what map types Postfix supports, use the command postconf -m.
If you do not have your own hostname (as with dynamic IP addressing) and must send mail as user@your-isp.com, you should also study the the section on delivering some users locally while sending mail as user@domain.
If your machine is disconnected most of the time, there isn't a lot of opportunity for Postfix to deliver mail to hard-to-reach corners of the Internet. It's better to drop the mail to a machine that is connected all the time.
/etc/postfix/main.cf: relayhost = smtprelay.someprovider.com
Normally, Postfix attempts to deliver outbound mail at its convenience. If your machine uses on-demand dialup IP, this causes your system to place a telephone call whenever you submit new mail, and whenever Postfix retries to deliver delayed mail. To prevent such telephone calls from being placed, disable spontaneous SMTP mail deliveries.
/etc/postfix/main.cf: defer_transports = smtp (Only for systems that use on-demand dialup IP)
Some people use Postfix to deliver mail across a LAN that is disconnected most of the time. Under such conditions, mail delivery can suffer from delays while the Postfix SMTP client performs sender and recipient domain DNS lookups in order to be standards-compliant. To prevent these delays, disable all SMTP client DNS lookups.
/etc/postfix/main.cf: disable_dns_lookups = yes (Only for delivery across LANs that are disconnected most of the time)
When you disable DNS lookups, you must specify the relayhost as either a numeric IP address, or as a hostname that resolves to one or more IP addresses (with DNS lookup disabled, Postfix does no MX lookup).
Put the following command into your PPP or SLIP dialup scripts:
The exact location of the sendmail command is system-specific. With some UNIX versions, use /usr/lib/sendmail.
In order to find out if the mail queue is flushed, use something like:
#!/bin/sh # Start deliveries. /usr/sbin/sendmail -q # Allow deliveries to start. sleep 10 # Loop until all messages have been tried at least once. while mailq | grep '^[^ ]*\*' >/dev/null do sleep 10 done
If you have disabled spontaneous SMTP mail delivery, you also need to run the above command every now and then while the dialup link is up, so that newly-posted mail is flushed from the queue.
With a distributed mail system such as Postfix, this is difficult to implement. Unlike sendmail, no Postfix mail delivery process runs under control by a user. Instead, Postfix delivers mail with daemon processes that have no parent-child relationship with user processes. This eliminates a large variety of potential security exploits with environment variables, signal handlers, and with other process attributes that UNIX passes on from parent process to child process.
Postfix uses multiple processes in order to insulate subsystems from each other. Making the delivery agents talk directly to user processes would defeat a lot of the effort that went into making Postfix more secure than ordinary mailers.
When I was using Sendmail, after 4 hours, it would always send a receipt back to the sender saying mail delivery is delayed.
In order to make Postfix send "delayed mail" notifications after four hours, specify:
/etc/postfix/main.cf: delay_warning_time = 4
With Postfix, delayed mail notices are turned off by default - people get enough mail already.
Some people will even argue that this is the "right" behavior. It is probably more a matter of expectation and of what one is used to.
This can be "fixed" only by making Postfix slower. In the above examples, Postfix would first have to completely expand all distribution lists before starting any delivery. By design, Postfix delivers mail to different destinations in parallel, and local delivery is no exception. This is why Postfix can be faster than sendmail.
Wietse believes that Postfix implements the "right" behavior, and suspects that Sendmail's default behavior is a remnant from a dark past when Sendmail used a pretty crummy algorithm to avoid aliasing loops.
However, as a result of a Postfix implementation artefact, the owner-foo alias takes effect only after the alias expansion is completed.
Delivery problems that happen while expanding the alias, including delivery to commands or files, are reported to the original sender envelope address.
The reason is that bounces are sent by the Postfix queue manager, which does not know that the sender address is being replaced.
This limitation will be fixed by changing how the Postfix local delivery agent deals with undeliverable mail.
# newaliases
Unfortunately, some Linux systems have a helpful utility called linuxconf that automatically "fixes" file permissions to what they are supposed to be for Sendmail's sendmail command. Even when you reset the set-uid bit on the Postfix sendmail executable file, linuxconf will happily turn it on again for you.
On SuSE systems the file permission fixing utulity is called SuSEconfig. Other Linux systems may use different names. The usual disclaimers about mileages etc. apply.
# /etc/rc.d/init.d/linuxconf stop && rpm --erase linuxconf
and to make sure that in /etc/rc.config, PERMISSIONS_SECURITY mentions local last, EXAMPLE:/usr/sbin/sendmail root.root 755
CHECK_PERMISSIONS=set PERMISSION_SECURITY="secure local"
The envelope sender address is also the default value for the From: header address, when none is specified in the message.
To fix, specify the envelope sender address on the sendmail command line:
sendmail -f user@domain ...
To set kernel parameters at boot time, add the following lines to the /boot/loader.conf file (this is specific to FreeBSD 4.x):
kern.ipc.maxsockets="5000" kern.maxfiles="16384" kern.maxfilesperproc="16384" kern.ipc.nmbclusters="65536"
To set kernel parameters at run time execute the following commands as root (this is specific to FreeBSD 4.x):
# sysctl -w kern.ipc.maxsockets=5000 # sysctl -w kern.maxfiles=16384 # sysctl -w kern.maxfilesperproc=16384 # sysctl -w kern.ipc.nmbclusters=65536
The following information is kernel version dependent.
To set parameters at boot time on Linux systems that have /etc/sysctl.conf, add the following lines:
fs.file-max = 16384 kernel.threads-max = 2048
To set kernel parameters at run time, execute the following commands as root:
# echo 16384 > /proc/sys/fs/file-max # echo 2048 > /proc/sys/kernel/threads-max
I have lots if mail in the incoming queue, but Postfix only runs a few outbound SMTP deliveries. Why is it not running more SMTP clients?
Your problem could be that the disk is saturated with I/O from receiving mail, so that the Postfix queue manager gets insufficient chance to process the requests (many SMTP server processes are competing for disk access against one poor queue manager).
You solve the problem by getting faster disks.
I am still solving the scheduling problem from the software side, but don't hold your breath.
Currently, the workaround is to configure multiple IP addresses per machine, and to run one Postfix instance per IP address, each instance preferably on a different disk. The Postfix instances can't share queue directories, but sharing mailbox directories is OK.
Just start each Postfix instance with a different configuration directory:
# postfix -c config_directory start
Each main.cf file has a different $myhostname setting, depending on the interface that it is supposed to handle.
/my/own/main.cf: queue_directory = /my/own/queue/directory myhostname = foo1.my.domain inet_interfaces = $myhostname
My Postfix server is too slow. When I telnet to the SMTP port (telnet hostname 25), the response comes after 40 seconds. On the other hand, when I telnet to the the POP port (telnet hostname 110) the response comes with no delay.
Answer:
You have a name service problem.Postfix calls the C library routines gethostbyname() and gethostbyaddr() in order to find out the SMTP client hostname. These library routines use several system configuration files in order to satisfy the request. They may in fact end up calling the DNS for reasons that are not under control by Postfix.
Depending on your system, these controlling files can be named /etc/nsswitch.conf, /etc/svcorder, /etc/host.conf or otherwise. Those files specify whether the C library routines will use local /etc/hosts before or after DNS.
The Postfix SMTP server logs client connections with numerical IP addresses instead of resolving the hostname. When I use nslookup the address does resolve to a name.
You run the Postfix SMTP server inside a chroot jail for extra security, but some configuration files are missing. In order to run inside a chroot jail, the Postfix SMTP client and server need copies of system configuration files inside the Postfix queue directory. The exact list of files is very system dependent, but you will probably need at the very least:
/var/spool/postfix/etc/resolv.conf /var/spool/postfix/etc/services
Of course, these directories and files must be owned by root, but they must be accessible by the postfix user, so directories need mode 0755 and files need mode 0644.
For more details, see the files in the examples/chroot-setup directory of the Postfix source code distribution.
>>> MAIL FROM:<someone@some.where> <<< 250 Ok >>> RCPT TO:<test@some.other.site@some.site> <<< 250 Ok >>> DATA <<< 354 End data with <CR><LF>.<CR><LF> >>> (message body) <<< 250 Ok: queued as A958F5A15
Don't Panic! Upgrade to a Postfix version of 19991227 or later. To find out what Postfix version you have, execute the command postconf mail_version.
With earlier Postfix versions,
With newer Postfix versions,
To be precise, Postfix UCE restrictions refuse to forward source-routed addresses under the following conditions:
However, a Postfix primary MX host for still forwards source-routed addresses if received from a trusted client, just like it did before.
In order to have guaranteed protection against source-routed relaying through trusted SMTP clients, specify a regular expression restriction ahead of the other SMTPD recipient restrictions:
/etc/postfix/main.cf: smtpd_recipient_restrictions = regexp:/etc/postfix/regexp_access ...other restrictions... /etc/postfix/regexp_access: /[%!@].*[%!@]/ 550 Sender specified routing is not supported here.
This would be installed on all MX hosts.
I have Postfix setup on a machine but I'd like to have a select group of Internet users be able to relay mail through it. I'd either like to base the relaying on IP address (e.g., a 256-block for dynamic IP people) or on hostname (whatever.dialup.isp.com)
The most preferable way is to have users submit mail via some authenticated protocol instead of plain old SMTP.
The next best way is to use plain old SMTP and to authenticate the user first, for example, with a "please login via POP before using SMTP" scheme. In that case, some software maintains a Postfix-compatible access table with client IP address information. In order to make this work you need Postfix version 19991231 or later.
/etc/postfix/main.cf: smtpd_recipient_restrictions = permit_mynetworks check_client_access hash:/etc/postfix/client_access check_relay_domains /etc/postfix/client_access: 4.3.2.1 OK 5.4.3.2 987654321
Specify dbm instead of hash if your system uses dbm files instead of db files. To find out what map types Postfix supports, use the command postconf -m.
N.B. Some non-Postfix software such as DRAC uses btree files instead of hash files. In that case, you will have to adjust the above check_client_access restriction accordingly.
A less preferable way is based on client IP address (for example, a 256-block) or DNS hostname (for example, whatever.pop.isp.com). This scheme does not authenticate the user. If you use IP/DNS-based relay access control, pray that no customer with that same ISP points their spam software at your machine, or else you may end up on internet-wide black lists.
The least preferable way is based on the sender address. It is trivially easy to spoof by anyone who ever received mail from your site. If you use sender address access control, pray that no spammer ever finds out the address of your users.
/etc/postfix/main.cf: smtpd_recipient_restrictions = permit_mynetworks check_client_access hash:/etc/postfix/client_access check_sender_access hash:/etc/postfix/sender_access check_relay_domains /etc/postfix/client_access: 11.22.33 OK dialup.isp.com OK /etc/postfix/sender_access: joe@my.domain OK blow@my.domain OK
How can I configure Postfix in a way that some users can send mail to the internet and other users not. The users with no access should receive a generic bounce message. Please don't discuss whether such access restrictions are necessary, it was not my decision.
Postfix has support for per-user restrictions. The restrictions are implemented by the SMTP server. Thus, users that violate the policy have their mail rejected by the SMTP server. Like this:
554 <user@remote>: Access denied
The implementation uses two lookup tables. One table defines what users are restricted in where they can send mail, and the other table defines what destinations are local. It is left as an exercise for the reader to change this into a scheme where only some users have permission to send send mail to off-site destinations, and where most users are restricted.
The example assumes DB/DBM files, but this could also be done with LDAP or SQL.
/etc/postfix/main.cf: smtpd_recipient_restrictions = check_sender_access hash:/etc/postfix/restricted_senders ...other stuff... smtpd_restriction_classes = local_only local_only = check_recipient_access hash:/etc/postfix/local_domains, reject /etc/postfix/restricted_senders: foo@domain local_only bar@domain local_only /etc/postfix/local_domains: this.domain OK matches this.domain and subdomains that.domain OK matches that.domain and subdomains
Specify dbm instead of hash if your system uses dbm files instead of db files. To find out what map types Postfix supports, use the command postconf -m.
The smtpd_restriction_classes verbiage exists so that Postfix can open /etc/postfix/local_domains.db before entering a chroot jail, so it is only an artefact of implementation.
This scheme does not authenticate the user, therefore it can be bypassed in several ways:
DNS: the.backed-up.domain.name IN MX 100 your.machine.name /etc/postfix/main.cf: relay_domains = $mydestination the.backed-up.domain.name smtpd_recipient_restrictions = permit_mynetworks check_relay_domains
When you are primary mx for a remote site you also need:
/etc/postfix/main.cf: transport_maps = hash:/etc/postfix/transport /etc/postfix/transport: the.backed-up.domain.name smtp:[their.mail.host.name]
Specify dbm instead of hash if your system uses dbm files instead of db files. To find out what map types Postfix supports, use the command postconf -m.
When I send mail to a remote address, the following happens:Jul 14 12:45:38 myhostname postfix/qmgr[2246]: 74FBF30501: from=<sender@sender.domain> size=309 (queue active) Jul 14 12:45:39 myhostname postfix/smtp[2349]: 74FBF30501: to=<recip@recip.domain> relay=none, delay=3944, status=deferred (Name service error for domain recip.domain: Host not found, try again)However, I can nslookup the hostname just fine.
There can be several different problems.
However, when you see mail deliveries fail consistently, you may have a different problem: broken path MTU discovery. Or it could be a broken PIX firewall.
The bug ID is CSCds90792. The "fixup protocol smtp" feature does not correctly handle the case where the "." and the "CRLF" at the end of mail are sent in separate packets.
How does one recognize a mailer behind a Cisco PIX with "fixup protocol smtp" enabled? As of version 5.1 and later, the fixup protocol smtp command changes the characters in the SMTP banner to asterisks except for the "2", "0" and "0 SPACE" characters.
When you connect to a mailer behind such a filter you see something like:
220 **************************************0******0*********20 ****200**0*********0*00
The message content, however, is sent as a few datagrams, each datagram typically a kbyte large or even bigger, depending on your local network MTU.
When mail fails consistently due to a timeout, I suspect that the sending machine runs a modern UNIX which implements path MTU discovery. That causes the machine to send packets as large as it would send over the LAN, with the IP DON'T FRAGMENT bit set, preventing intermediate routers from fragmenting the packets that are too big for their networks.
Depending on what network path a message follows, some router on the way responds with an ICMP MUST FRAGMENT message saying the packet is too big. Normally, the sending machine will re-send the data after chopping it up into smaller pieces.
However, things break when some router closer to the sending system is dropping such ICMP feedback messages, in a mistaken attempt to protect systems against certain attacks. In that case, the ICMP feedback message never reaches the sending machine, and the connection times out.
This is the same configuration problem that causes trouble with web servers behind a misconfigured packet filter: small images/files are sent intact, large images/files time out because the server does not see the MUST FRAGMENT ICMP feedback messages.
Workaround: disable path MTU discovery at the sending machine. Mail will get out, but of course everyone else will still suffer. How to disable path MTU discovery? It depends. Solaris has an ndd command; other systems use different means such as sysctl to control kernel parameters on a running system.
Fix: find the router that drops the ICMP MUST FRAGMENT messages, and convince the person responsible for it to fix the configuration.
If the first server that speaks SMTP rejects the connection by greeting the client with a 5xx status code, which means "I will never accept your mail", Postfix gives up and bounces the message to the sender.
If the first server that speaks SMTP rejects the connection by greeting the client with a 4xx status code, which means "come back later", Postfix backs off and defers delivery until later.
Some people will argue that Postfix should contact the other MX addresses even when the server greets with 4xx or 5xx, if only because that is what Sendmail does, and of course we know that everything Sendmail does is right.
Unfortunately, some people configure their infrastructure badly. Their most preferred MX server is visible to the world but it rejects connections from outside with a 5xx or 4xx greeting. Just because Sendmail goes to the second-best MX server, these people assume that every mailer will do so.
If such configurations are a problem for you, below are some controls that work around them.
/etc/postfix/main.cf: smtp_skip_4xx_greeting = yes smtp_skip_5xx_greeting = yes
The smtp_skip_5xx_greeting is present in Postfix releases later than 20000104. To find out what Postfix version you have, use the command postconf mail_version.
Execute the command postfix reload to make the change effective
immediately.
Enabling chroot operation adds a non-trivial barrier for system
penetrators.
Two solutions:
What does "fatal: unknown service: smtp/tcp" mean?
The Postfix
/etc/postfix/master.cf file specifies that the Postfix SMTP client runs
inside a chroot environment. However, the files necessary for that mode
of operation are not installed below /var/spool/postfix.
Root's mail is delivered to nobody
If you use procmail (or some other
command) for local mail delivery, Postfix will not deliver mail as root.
Instead, Postfix runs procmail (or whatever) as nobody. Perhaps
some day Wietse will trust Postfix enough to run external commands as
root.
Solution: just like you're not supposed to log in as root (except for unusual conditions), you're not supposed to receive mail as root.
/etc/aliases: root: you
On some systems the alias database is not in /etc/aliases. To find out the location for your system, execute the command postconf alias_maps.
The warning message means that new mail notificiation failed because the comsat network service is turned off.
To disable the comsat client code in the Postfix delivery agent, specify:
/etc/postfix/main.cf: biff = no
To enable the comsat network service, uncomment the corresponding entry in the inetd.conf file, and kill -HUP the inetd process.
The warning message means that NIS (Network Information Service) is not enabled on your machine. That is perfectly OK. It's just hard for Postfix to find out about these things ahead of time.
To disable the NIS client code in the Postfix local delivery agent, update the corresponding section in the main.cf file and specify one of the following, depending on the type of aliases file:
/etc/postfix/main.cf: alias_maps = $alias_database
This forces Postfix to use only the local aliases database, if one is defined.
The information in this section applies to Postfix versions 19991216 and later. To find out what Postfix version you have, execute the command postconf mail_version.
By default, the Postfix SMTP server does not know what local users exist, and will happily accept mail for unknown@your.site. The reason is that different local delivery agents have different types of user databases.
Of course mail for a non-existent local user will eventually bounce as undeliverable, but why accept such mail in the first place? You can tell the Postfix SMTP server how to find out if a user exists by listing all tables with local addresses in the local_recipient_maps parameter.
For example, if you use the default Postfix local delivery agent in /etc/postfix/master.cf, specify:
/etc/postfix/main.cf: local_recipient_maps = $alias_maps, unix:passwd.byname
However, if you run the Postfix SMTP server chrooted, on some systems it will be necessary to have a copy of the passwd file inside the chroot jail (typically: in /var/spool/postfix/etc). The only way to find out is to try.
By default, the Postfix SMTP server is aware of Postfix virtual maps, and will accept mail for known-user@virtual.domain without further configuration.
/etc/postfix/main.cf: myorigin = domain.name
/etc/postfix/main.cf: virtual_maps = hash:/etc/postfix/virtual /etc/postfix/virtual: root root@localhost postmaster postmaster@localhost
Specify dbm instead of hash if your system uses dbm files instead of db files. To find out what map types Postfix supports, use the command postconf -m.
/etc/postfix/main.cf: home_mailbox = Maildir/
Any relative pathname that ends in / turns on maildir delivery. The home_mailbox value is appended to the user's home directory pathname.
The maildir format is also supported with delivery via aliases or via .forward files. Specify /file/name/ as destination. The trailing / turns on maildir delivery.
/etc/postfix/main.cf: mailbox_command = /path/to/procmail /etc/postfix/main.cf: mailbox_command = /path/to/procmail -a $EXTENSION
If you can, avoid using any shell meta characters or built-ins such as $ or " or IFS or &&, because they force Postfix to run an expensive shell process. However, procmail is a pig, and the gain of avoiding a shell can be unnoticeable.
- DOMAIN
- The text to the right-hand side of the @ in the recipient address.
- EXTENSION
- Optional address extension part.
- HOME
- The recipient's home directory.
- LOCAL
- The text to the left-hand side of the @ in the recipient address, for example, $USER+$EXTENSION.
- LOGNAME
- The recipient username.
- RECIPIENT
- The entire recipient address, $LOCAL@$DOMAIN.
- SHELL
- The recipient's login shell.
- USER
- The recipient username.
Solutions, ranging from fighting symptoms to turning off the Delivered-To: header:
/etc/postfix/main.cf: smtpd_recipient_restrictions = ... regexp:/etc/postfix/access_regexp ... smtpd_recipient_restrictions = ... pcre:/etc/postfix/access_regexp ... /etc/postfix/access_regexp: /^(.*)-outgoing@(.*)/ 554 Use $1@$2 instead
POSIX regular expression support (regexp) is enabled by default on modern UNIX systems. Perl-compatible regular expression support (pcre) is optional; see the PCRE_README file in the top-level Postfix source directory.
See also the FAQ item for problems with the majordomo approve command.
Currently, the recommended workaround is to edit the approve script to strip any header lines that match:
/delivered-to/i
Yes, this assumes that the moderator knows what she is doing.
A less-preferred workaround is to not insert Delivered-To: when delivering to commands such as majordomo. See the FAQ entry titled "Getting rid of the ugly Delivered-To: header".
If you must receive mail for systems with 10-year old vulnerabilities, it is prudent to set up a regexp filter that rejects potentially harmful MAIL FROM or RCPT TO commands.
/etc/postfix/main.cf: smtpd_sender_restrictions = regexp:/etc/postfix/envelope-regexp reject_unknown_sender_domain smtpd_recipient_restrictions = regexp:/etc/postfix/envelope-regexp permit_mynetworks check_relay_domains /etc/postfix/envelope-regexp: /[/|]/ REJECT
However, rejecting all envelope addresses with / causes trouble with simple-minded X.400 to Internet address mappings that leave the X.400 address structure exposed.
See also the documentation on header checks restrictions for message header contents. These restrictions can be used to protect against attacks with command/file destinations in, for example, Errors-To: or Return-Receipt_To: message headers.
We want to implement an internal email distribution list. Something like all@our.domain.com, which aliases to all employees. My first thought was to use the aliases map, but that would lead to "all" being accessible from the "outside", and this is not desired... :-)Postfix can implement per-address access controls. What follows is based on the SMTP client IP address, and therefore is subject to IP spoofing.
/etc/postfix/main.cf: smtpd_recipient_restrictions = hash:/etc/postfix/access ..the usual stuff... /etc/postfix/access: all permit_mynetworks,reject
Specify dbm instead of hash if your system uses dbm files instead of db files. To find out what map types Postfix supports, use the command postconf -m.
Now, that would be sufficient when your machine receives all Internet mail directly from the Internet. That's unlikely if your network is a bit larger than an office. For example your backup MX hosts would "launder" the client IP address of mail from outside so it would appear to come from a trusted machine.
In the general case you need two lookup tables: one table that lists destinations that need to be protected, and one table that lists domains that are allowed to send to the protected destinations.
What follows is based on the sender SMTP envelope address, and therefore is subject to SMTP sender spoofing.
/etc/postfix/main.cf: smtpd_recipient_restrictions = hash:/etc/postfix/protected_destinations ..the usual stuff... smtpd_restriction_classes = insiders_only insiders_only = check_sender_access hash:/etc/postfix/insiders, reject /etc/postfix/protected_destinations: all@my.domain insiders_only all@my.hostname insiders_only /etc/postfix/insiders: my.domain OK another.domain OK
The smtpd_restriction_classes verbiage is needed so that Postfix knows what lookup tables to open before it goes to chroot jail. It is only an artefact of the implementation.
Getting past this scheme is relatively easy, because all one has to do is to spoof the SMTP sender address.
If the internal list is a low-volume one, perhaps it makes more sense to make it moderated.
Sendmail-style virtual domains are not supported in Postfix versions released before 20001118.
Be sure to follow instructions in the virtual manual page.
Long reply follows.
Delivering mail to a command is a security-sensitive operation, because the command must be executed with the right privileges. Only root-privileged software such as the Postfix local delivery agent can set the privileges for a command.
For security reasons, Postfix tries to avoid using root privileges where possible. In particular, Postfix virtual mapping is done by an unprivileged daemon, so there is no secure way to execute commands found in virtual maps.
Answer: I hope we all agree that delivering a domain to a mailbox is disgusting practice. Forwarding mail via SMTP or UUCP would be a much better choice. Unfortunately, neither SMTP nor UUCP are a usable alternative for legions of windows users.
That said, it is possible to propagate the original virtual recipient information to the Delivered-To: header. The trick is to use a virtual map that uses regular expressions instead of the more traditional indexed files.
The following delivers username@virtual.domain with a Delivered-To: message header that contains joe+username@your.domain. Postfix already puts the envelope sender address in the Return-Path: header. The information in the Delivered-To: and Return-Path: headers is sufficient to reliably implement a domain in a mailbox.
/etc/postfix/main.cf: recipient_delimiter = + virtual_maps = ...non-regexp virtual maps... regexp:/etc/postfix/virtual_regexp /etc/postfix/virtual_regexp: /^virtual\.domain$/ whatever /^(.*)@virtual\.domain$/ joe+$1
Notes:
Address masquerading is intended for use only on mail gateways.
/etc/postfix/main.cf: masquerade_domains = $mydomain
Note that the gateway should have append_dot_mydomain and append_at_myorigin turned on (which is the default setting) so that all addresses are fully qualified before they are subjected to address masquerading.
In some cases, you may wish to have certain users or hosts exempted from masquerading.
/etc/postfix/main.cf: masquerade_exceptions = root
/etc/postfix/main.cf: masquerade_domains = somehost.my.domain otherhost.my.domain $mydomain
Note that the order above is crucial: exemptions such as somehost.my.domain must precede $mydomain in the statement.
It should go without saying that if a particular host you wish to exempt this way is originating mail as user@my.domain in the first place, you can hardly exempt it.
Currently, Postfix has no hooks to let other programs inspect every message, so the scanning has to be done before mail enters Postfix or while mail leaves Postfix, for example at mailbox delivery time.
Examples:
/etc/postfix/main.cf: mailbox_command = /some/program ...
This example specifies a command that delivers all local mail to mailbox. See the sample main.cf file for examples. In /etc/aliases, you must specify an alias for root that directs mail to a real person, otherwise mail sent to root will not work as expected.
/etc/postfix/main.cf: mailbox_transport = foo
This example delegates local mailbox delivery to the transport foo as configured in /etc/postfix/master.cf. If you follow this route you will build something around the pipe mailer. See examples in master.cf.
/etc/postfix/transport: some.domain uucp:uucp-host .some.domain uucp:uucp-host
See the transport manual page for more details.
/etc/postfix/main.cf: transport_maps = hash:/etc/postfix/transport
Specify dbm instead of hash if your system uses dbm files instead of db files. To find out what map types Postfix supports, use the command postconf -m.
/etc/postfix/master.cf: uucp unix - n n - - pipe flags=F user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
This runs the uux command, and substitutes the next-hop hostname (uucp-host) and the recipients before executing the command. The uux command is executed without assistance from the shell, so there are no problems with shell meta characters.
/etc/postfix/main.cf: relay_domains = some.domain $mydestination ...
See the relay_domains configuration parameter description for details.
/etc/postfix/main.cf: relayhost = uucp-gateway default_transport = uucp
/etc/postfix/master.cf: uucp unix - n n - - pipe flags=F user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
This runs the uux command, and substitutes the next-hop hostname (uucp-gateway, or whatever you specified) and the recipients before executing the command. The uux command is executed without assistance from the shell, so there are no problems with shell meta characters.
Over here we are using the scheme <fax number>@fax.our.domain with Postfix and HylaFax. Here's the setup used:
/etc/postfix/master.cf: fax unix - n n - 1 pipe flags= user=fax argv=/usr/bin/faxmail -d -n ${user} /etc/postfix/transport: fax.your.domain fax:localhost /etc/postfix/main.cf: transport_maps = hash:/etc/postfix/transport fax_destination_recipient_limit = 1
The process limit of 1 in the master.cf file is necessary with fax software that cannot handle multiple requests at the same time. It won't hurt otherwise.
The fax_destination_recipient_limit entry (by Simon, Mr. Simix) is necessary with fax software that can't have more than one destination on its command line. It won't hurt otherwise.
Specify dbm instead of hash if your system uses dbm files instead of db files. To find out what map types Postfix supports, use the command postconf -m.
Note: be sure to not advertise fax.your.domain in the DNS :-)
# cd /var/spool/postfix # find incoming active deferred -name ABCDEF -print | sed 1q | xargs rm
The above command is safe because it deletes at most one file. There is no risk of deleting newly arrived mail that happens to get the same queue file name.
If you have to delete a large amount of mail, you must stop Postfix first.
# postfix stop # cd /var/spool/postfix # find incoming active deferred defer -type f -print | fgrep -xf /file/with/queue-ids | xargs rm # postfix start
Do not use the above find command on a running Postfix system, because it can delete files that belong to new mail that arrives while you are deleting queue files.
Postfix names a queue file after its inode number and after the microsecond part of the time of day. Thus, if a queue file has a name based on someone elses inode number there is a small chance that the file name will collide with another queue file.
To avoid queue file name collisions when copying queue files, restore queue files in the maildrop directory instead.
# postfix stop ... restore queue files under the maildrop directory... # postfix start
When Postfix is started, it will pick up queue files from the maildrop directory and will give them proper queue file names.
|