From: Matt Hayes on


On 04/21/2010 09:23 PM, David Cottle wrote:
>
>
> Sent from my iPhone
>
> On 22/04/2010, at 10:28, Matt Hayes <dominian(a)slackadelic.com> wrote:
>
>>
>> On 04/21/2010 08:14 PM, webmaster(a)aus-city.com wrote:
>>> Quoting Matt Hayes <dominian(a)slackadelic.com>:
>>>
>>>> n 04/21/2010 07:35 PM, David Cottle wrote:
>>>>
>>>>> #submission inet n - n - - smtpd
>>>>> # -o smtpd_tls_security_level=encrypt
>>>>> # -o smtpd_sasl_auth_enable=yes
>>>>> # -o smtpd_client_restrictions=permit_sasl_authenticated,reject
>>>>> # -o milter_macro_daemon_name=ORIGINATING
>>>>
>>>> Seems submission is commented out?
>>>>
>>>> -matt
>>>>
>>>
>>> Hi Matt,
>>>
>>> No its not look further down:
>>>
>>> smtpd_tls_wrappermode=yes
>>> submission inet n - - - - smtpd -o smtpd_enforce_tls=yes -o
>>> smtpd_sasl_auth_enable=yes -o
>>> smtpd_client_restrictions=permit_sasl_authenticated,reject -o
>>> smtpd_sender_restrictions= -o smtpd_proxy_filter=127.0.0.1:10025
>>>
>>>
>>>
>>
>>
>> ahhh missed that!
>>
>> If you have smtpd_recipient_restrictions defined in main.cf you'll have
>> to negate them just as you did with smtpd_sender_restrictions
>>
>> -Matt
>
> Hi Matt,
>
> In main.cf I have got in smptd sender restrictions permit sasl
> authenticated.
>
> It's also in smtpd recipient restrictions as the 3rd after mynetworks
> and a plesk no relay check.
>
> smtpd client restrictions it's 2nd after a plesk blacklist check.
>
> In client restrictions it's the 2nd one, as my whitelists is first.
>
> I know it's RBL killing as it's complaints about ISP dynamic message.
>
> I can post my actual main.cf later when I have PC as I am on iPhone.
>
> Is there also a command to dump the config?
>
> Thanks!
>
>


The best way: postconf -n


-Matt

From: Noel Jones on
On 4/21/2010 6:35 PM, David Cottle wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> I am having some issues with my server blocking ISP IP addresses.
>
> I know a recent update to plesk-9.5.1 changed my postfix main.cf and
> master.cf (the timestamps changed). I managed to fix main.cf as on
> the smtpd_client_restrictions, they put the RBLs first.
>
> Can anyone see what is wrong in the master.cf?
>
> I just want submission on 587 able to bypass RBL checks:

you must have missed the answer yesterday.

>
> #
> # Postfix master process configuration file. For details on the format
> ==========================================================================
[...]
> submission inet n - - - - smtpd -o smtpd_enforce_tls=yes -o
> smtpd_sasl_auth_enable=yes -o
> smtpd_client_restrictions=permit_sasl_authenticated,reject -o
> smtpd_sender_restrictions= -o smtpd_proxy_filter=127.0.0.1:10025

add here:

-o smtpd_helo_restrictions=
-o
smtpd_recipient_restrictions=permit_sasl_authenticated,reject


-- Noel Jones

From: David Cottle on


Sent from my iPhone

On 22/04/2010, at 11:38, Matt Hayes <dominian(a)slackadelic.com> wrote:

>
>
> On 04/21/2010 09:23 PM, David Cottle wrote:
>>
>>
>> Sent from my iPhone
>>
>> On 22/04/2010, at 10:28, Matt Hayes <dominian(a)slackadelic.com> wrote:
>>
>>>
>>> On 04/21/2010 08:14 PM, webmaster(a)aus-city.com wrote:
>>>> Quoting Matt Hayes <dominian(a)slackadelic.com>:
>>>>
>>>>> n 04/21/2010 07:35 PM, David Cottle wrote:
>>>>>
>>>>>> #submission inet n - n - - smtpd
>>>>>> # -o smtpd_tls_security_level=encrypt
>>>>>> # -o smtpd_sasl_auth_enable=yes
>>>>>> # -o smtpd_client_restrictions=permit_sasl_authenticated,reject
>>>>>> # -o milter_macro_daemon_name=ORIGINATING
>>>>>
>>>>> Seems submission is commented out?
>>>>>
>>>>> -matt
>>>>>
>>>>
>>>> Hi Matt,
>>>>
>>>> No its not look further down:
>>>>
>>>> smtpd_tls_wrappermode=yes
>>>> submission inet n - - - - smtpd -o smtpd_enforce_tls=yes -o
>>>> smtpd_sasl_auth_enable=yes -o
>>>> smtpd_client_restrictions=permit_sasl_authenticated,reject -o
>>>> smtpd_sender_restrictions= -o smtpd_proxy_filter=127.0.0.1:10025
>>>>
>>>>
>>>>
>>>
>>>
>>> ahhh missed that!
>>>
>>> If you have smtpd_recipient_restrictions defined in main.cf you'll
>>> have
>>> to negate them just as you did with smtpd_sender_restrictions
>>>
>>> -Matt
>>
>> Hi Matt,
>>
>> In main.cf I have got in smptd sender restrictions permit sasl
>> authenticated.
>>
>> It's also in smtpd recipient restrictions as the 3rd after mynetworks
>> and a plesk no relay check.
>>
>> smtpd client restrictions it's 2nd after a plesk blacklist check.
>>
>> In client restrictions it's the 2nd one, as my whitelists is first.
>>
>> I know it's RBL killing as it's complaints about ISP dynamic message.
>>
>> I can post my actual main.cf later when I have PC as I am on iPhone.
>>
>> Is there also a command to dump the config?
>>
>> Thanks!
>>
>>
>
>
> The best way: postconf -n
>
>
> -Matt

alias_database = hash:/etc/aliases
alias_maps = hash:/etc/aliases, hash:/var/spool/postfix/plesk/aliases
command_directory = /usr/sbin
config_directory = /etc/postfix
daemon_directory = /usr/libexec/postfix
data_directory = /var/lib/postfix
debug_peer_level = 2
header_checks = regexp:/etc/postfix/header_checks
html_directory = no
inet_interfaces = all
inet_protocols = all
local_recipient_maps = $virtual_mailbox_maps
mail_owner = postfix
mailq_path = /usr/bin/mailq.postfix
manpage_directory = /usr/share/man
message_size_limit = 20480000
mydestination = localhost.$mydomain, localhost, localhost.localdomain
mynetworks = 127.0.0.0/8, 10.0.0.0/8, 10.0.10.1/32 [::1]/128
[fe80::%eth0]/64, 192.168.0.0/24, 203.19.70.65, 202.129.79.106, 203.217.18.104/30
, 203.206.180.36/30, 203.206.129.128/27
newaliases_path = /usr/bin/newaliases.postfix
notify_classes =
queue_directory = /var/spool/postfix
readme_directory = /usr/share/doc/postfix-2.5.6/README_FILES
sample_directory = /usr/share/doc/postfix-2.5.6/samples
sendmail_path = /usr/sbin/sendmail.postfix
setgid_group = postdrop
smtp_send_xforward_command = yes
smtp_tls_security_level = may
smtp_use_tls = no
smtpd_authorized_xforward_hosts = 127.0.0.0/8
smtpd_client_restrictions = check_client_access hash:/etc/postfix/
whitelist, permit_sasl_authenticated, check_client_access hash:/etc/
postfix/check_backscatterer, check_client_access hash:/etc/postfix/
check_spamcannibal, check_client_access cidr:/etc/postfix/postfix-
dnswl-permit, reject_rbl_client bl.spamcop.net, reject_rbl_client zen.spamhaus.org
, reject_rbl_client b.barracudacentral.org
smtpd_proxy_timeout = 3600s
smtpd_recipient_restrictions = permit_mynetworks, check_client_access
pcre:/var/spool/postfix/plesk/no_relay.re, permit_sasl_authenticated,
reject_unauth_destination
smtpd_sasl_auth_enable = yes
smtpd_sender_restrictions = check_sender_access hash:/var/spool/
postfix/plesk/blacklists, permit_sasl_authenticated,
check_client_access pcre:/var/spool/postfix/plesk/non_auth.re
smtpd_timeout = 3600s
smtpd_tls_cert_file = /etc/postfix/postfix_default.pem
smtpd_tls_key_file = $smtpd_tls_cert_file
smtpd_tls_security_level = may
smtpd_use_tls = yes
transport_maps = hash:/var/spool/postfix/plesk/transport
unknown_local_recipient_reject_code = 550
virtual_alias_maps = $virtual_maps, hash:/var/spool/postfix/plesk/
virtual
virtual_gid_maps = static:31
virtual_mailbox_base = /var/qmail/mailnames
virtual_mailbox_domains = $virtual_mailbox_maps, hash:/var/spool/
postfix/plesk/virtual_domains
virtual_mailbox_maps = hash:/var/spool/postfix/plesk/vmailbox
virtual_transport = plesk_virtual
virtual_uid_maps = static:110

From: Noel Jones on
On 4/21/2010 9:01 PM, David Cottle wrote:
>> The best way: postconf -n
>>
>>
>> -Matt
>
> smtpd_client_restrictions = check_client_access
> hash:/etc/postfix/whitelist, permit_sasl_authenticated,
> check_client_access hash:/etc/postfix/check_backscatterer,
> check_client_access hash:/etc/postfix/check_spamcannibal,
> check_client_access cidr:/etc/postfix/postfix-dnswl-permit,
> reject_rbl_client bl.spamcop.net, reject_rbl_client zen.spamhaus.org,
> reject_rbl_client b.barracudacentral.org

OK, permit_sasl_authenticated comes before reject_rbl_client.

> smtpd_recipient_restrictions = permit_mynetworks, check_client_access
> pcre:/var/spool/postfix/plesk/no_relay.re, permit_sasl_authenticated,
> reject_unauth_destination

OK, permit_sasl_authenticated comes before reject_rbl_client.

> smtpd_sender_restrictions = check_sender_access
> hash:/var/spool/postfix/plesk/blacklists, permit_sasl_authenticated,
> check_client_access pcre:/var/spool/postfix/plesk/non_auth.re

OK, no RBL checks.


Conclusion: If a client is rejected by RBL checks, they
didn't authenticate. You can verify this in your postfix logs.

-- Noel Jones