我们使用虚拟别名映射并配置了 spamassassin,为多个托管域运行一个小型 postfix(和 dovecot)邮件服务器。
最近很明显,我们正在产生一些反向散射;垃圾邮件进入不存在的电子邮件地址,并被退回给伪造的发件人。就我们的邮件服务器的声誉而言,这显然是一个问题,也意味着我们正在代表垃圾邮件发送者发送垃圾邮件。
然后我想做的是更改后缀行为,以便在 SMTP 事务期间拒绝邮件,而不是生成退回电子邮件表单 MAILER-DAEMON。
我尝试添加 local_recipient_maps ( http://www.postfix.org/LOCAL_RECIPIENT_README.html ),但这没有任何区别。我认为这是因为我正在使用 virtual_alias_maps(其他虚拟邮箱解决方案似乎也不适用于这里)。
postconf -n 生成:
alias_database = hash:/etc/aliases
alias_maps = hash:/etc/aliases
command_directory = /usr/sbin
config_directory = /etc/postfix
daemon_directory = /usr/libexec/postfix
data_directory = /var/lib/postfix
debug_peer_level = 2
debugger_command = PATH=/bin:/usr/bin:/usr/local/bin:/usr/X11R6/bin ddd $daemon_directory/$process_name $process_id & sleep 5
html_directory = no
inet_interfaces = all
inet_protocols = all
local_recipient_maps = proxy:unix:passwd.byname $alias_maps
mail_owner = postfix
mail_spool_directory = /var/spool/mail
mailbox_size_limit = 0
mailq_path = /usr/bin/mailq.postfix
manpage_directory = /usr/share/man
message_size_limit = 0
mydestination = $myhostname, localhost.$mydomain, localhost
mydomain = verrotech.com
myhostname = mail.verrotech.com
newaliases_path = /usr/bin/newaliases.postfix
queue_directory = /var/spool/postfix
readme_directory = /usr/share/doc/postfix-2.10.1/README_FILES
sample_directory = /usr/share/doc/postfix-2.10.1/samples
sendmail_path = /usr/sbin/sendmail.postfix
setgid_group = postdrop
smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination
smtpd_sasl_auth_enable = yes
smtpd_sasl_path = private/auth
smtpd_sasl_type = dovecot
smtpd_tls_auth_only = yes
smtpd_tls_cert_file = /etc/letsencrypt/live/mail.domain.com/fullchain.pem
smtpd_tls_key_file = /etc/letsencrypt/live/mail.domain.com/privkey.pem
smtpd_tls_security_level = may
unknown_local_recipient_reject_code = 550
virtual_alias_maps = hash:/etc/postfix/virtual
谢谢你。