
我正在使用 check_recipient_mx_access,這樣我就可以將所有 Office365 託管或 google 託管的網域路由到特殊的電子郵件網關 [因為 SPF、DMARC 等]。
smtpd_recipient_restrictions = ..., check_recipient_mx_access hash:/etc/postfix/mx_access,...
在 /etc/postfix/mxaccess 中
.protection.outlook.com FILTER smtp:[IP.AD.DR.ESS]
.google.com FILTER smtp:[IP.AD.DR.ESS]
這對於每個收件人都很有效,但當有多個收件人時有時會失敗。
例如 sender@mydom 傳送到 dest1@hotmail AND dest2@mydom2 然後 dest2@mydom2 被轉送到 [IP.AD.DR.ESS] 這是錯誤的。
這對於第一個收件人來說是可以的,因為它的MX 解析some.protection.outlook.com 但不是第二個收件人,因為mydom2 在Transport_maps 中有一個特殊的路由,在這種情況下不會使用它,並且因為它的MX 不會解析匹配的內容mxaccess 表。
[如果只有 dest2@mydom2 作為收件人,則路由正常]
[如果有多個 @mydom2 @mydom3 dest,且不匹配 mxaccess ,則路由正常]
註:這是 ubuntu 上的 postfix 3.3.0。
postconf -M
smtp inet n - - - - smtpd
pickup fifo n - - 60 1 pickup
cleanup unix n - - - 0 cleanup
qmgr fifo n - n 300 1 qmgr
tlsmgr unix - - - 1000? 1 tlsmgr
rewrite unix - - - - - trivial-rewrite
bounce unix - - - - 0 bounce
defer unix - - - - 0 bounce
trace unix - - - - 0 bounce
verify unix - - - - 1 verify
flush unix n - - 1000? 0 flush
proxymap unix - - n - - proxymap
smtp unix - - - - - smtp
relay unix - - - - - smtp -o fallback_relay=
showq unix n - - - - showq
error unix - - - - - error
discard unix - - - - - discard
local unix - n n - - local
virtual unix - n n - - virtual
lmtp unix - - - - - lmtp
anvil unix - - - - 1 anvil
scache unix - - - - 1 scache
maildrop unix - n n - - pipe flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient}
uucp unix - n n - - pipe flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
ifmail unix - n n - - pipe flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
bsmtp unix - n n - - pipe flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient
scalemail-backend unix - n n - 2 pipe flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
mailman unix - n n - - pipe flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py ${nexthop} ${user}
retry unix - - - - - error
policyd-spf unix - n n - 0 spawn user=policyd-spf argv=/usr/sbin/postfix-policyd-spf-perl
~# postconf -n
alias_database = hash:/etc/postfix/aliases
alias_maps = hash:/etc/postfix/aliases
command_directory = /usr/sbin
compatibility_level = 2
debug_peer_level = 2
debugger_command = PATH=/usr/bin:/usr/X11R6/bin xxgdb $daemon_directory/$process_name $process_id & sleep 5
inet_interfaces = all
local_recipient_maps =
mail_owner = postfix
mailbox_command = procmail -a "$EXTENSION"
mailbox_size_limit = 0
mailq_path = /usr/bin/mailq.postfix
manpage_directory = /usr/share/man
message_size_limit = 20480000
mydestination = $myhostname, localhost.$mydomain, penty.of.domains.tld
mynetworks = 172.16.0.0/16, 192.168.10.0/24, 127.0.0.0/8, 10.0.0.0/24
myorigin = /etc/mailname
newaliases_path = /usr/bin/newaliases.postfix
queue_directory = /var/spool/postfix
readme_directory = /usr/share/doc/postfix-1.1.12/README_FILES
recipient_delimiter = +
relayhost =
sample_directory = /usr/share/doc/postfix-1.1.12/samples
sendmail_path = /usr/sbin/sendmail.postfix
setgid_group = postdrop
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
smtpd_recipient_restrictions = reject_invalid_hostname, check_recipient_mx_access hash:/etc/postfix/mxaccess, permit_mynetworks, reject_non_fqdn_recipient, reject_unknown_recipient_domain, reject_non_fqdn_sender, check_recipient_access hash:/etc/postfix/recipientaccess, reject_unauth_pipelining, reject_unauth_destination, reject_unverified_recipient, check_sender_access hash:/etc/postfix/senderaccess, reject_unknown_sender_domain, reject_rbl_client sbl.spamhaus.org, reject_rbl_client psbl.surriel.com, reject_rbl_client bl.spamcop.net, reject_rbl_client dnsbl-3.uceprotect.net, check_policy_service inet:127.0.0.1:60000, check_policy_service unix:private/policyd-spf, permit
smtpd_relay_restrictions = reject_invalid_hostname, reject_non_fqdn_sender, reject_non_fqdn_recipient, reject_unknown_recipient_domain, permit_mynetworks, reject_unknown_sender_domain, reject_unauth_pipelining, reject_unauth_destination, check_recipient_access hash:/etc/postfix/recipientaccess, reject_unverified_recipient, check_sender_access hash:/etc/postfix/senderaccess, reject_rbl_client sbl.spamhaus.org, reject_rbl_client psbl.surriel.com, reject_rbl_client bl.spamcop.net, reject_rbl_client dnsbl-3.uceprotect.net, check_policy_service inet:127.0.0.1:60000, check_policy_service unix:private/policyd-spf, permit
smtpd_tls_cert_file = /etc/letsencrypt/live/XXXXXXXXXXXXXXX/fullchain.pem
smtpd_tls_ciphers = high
smtpd_tls_key_file = /etc/letsencrypt/live/XXXXXXXXXXXXXXX/privkey.pem
smtpd_tls_loglevel = 1
smtpd_tls_protocols = !SSLv2, !SSLv3
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
smtpd_use_tls = yes
transport_maps = hash:/etc/postfix/transport
virtual_alias_domains = XXXXXXXXXX
virtual_alias_maps = regexp:/etc/postfix/virtual_re
答案1
這對於第一個收件人來說是可以的,因為它的MX 解析some.protection.outlook.com 但不是第二個收件人,因為mydom2 在Transport_maps 中有一個特殊的路由,在這種情況下不會使用它,並且因為它的MX 不會解析匹配的內容mxaccess 表。
我找到了這段文字:
- 如果一則訊息觸發多個過濾操作,則只有最後一個生效。
- 相同的內容過濾器適用於給定訊息的所有收件人。