我取消了中的“提交”部分的注释/etc/postfix/master.cf
,并且我的防火墙在端口 587 上打开。
当我尝试通过 TLS 端口 587 提交消息时出现以下错误:
Sep 30 13:41:05 mailer postfix/smtpd[7577]: warning: SASL authentication problem: unable to open Berkeley db /etc/sasldb2: No such file or directory
Sep 30 13:41:05 mailer postfix/smtpd[7577]: warning: SASL authentication problem: unable to open Berkeley db /etc/sasldb2: No such file or directory
Sep 30 13:41:05 mailer postfix/smtpd[7577]: warning: SASL authentication failure: no secret in database
Sep 30 13:41:05 mailer postfix/smtpd[7577]: warning: unknown[66.109.xxx.xxx]: SASL CRAM-MD5 authentication failed: authentication failure
我已让 saslauthd 在端口 25 上运行良好。以下是其内容/etc/postfix/sasl/smtpd.conf
:
pwcheck_method: saslauthd
auxprop_plugin: sasldb
saslauthd_path: /var/run/saslauthd/mux
mech_list: PLAIN LOGIN CRAM-MD5 DIGEST-MD5
我认为我应该将此文件复制到同一目录中的另一个文件并调用它submission.conf
,但这似乎没有任何作用。
我已经重新启动了 saslauthd 和 postfix,但没有效果。
这是我的/etc/postfix/main.cf
:
# See /usr/share/postfix/main.cf.dist for a commented, more complete version
# Debian specific: Specifying a file name will cause the first
# line of that file to be used as the name. The Debian default
# is /etc/mailname.
#myorigin = /etc/mailname
smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu)
biff = no
# appending .domain is the MUA's job.
append_dot_mydomain = no
# Uncomment the next line to generate "delayed mail" warnings
#delay_warning_time = 4h
readme_directory = no
# TLS parameters
smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
smtpd_use_tls=yes
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
# See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for
# information on enabling SSL in the smtp client.
myhostname = mailer.domain.com
#mydomain = mailer.domain.com
alias_maps = hash:/etc/aliases
alias_database = hash:/etc/aliases
myorigin = /etc/mailname
mydestination = mailer.domain.com
relayhost =
mynetworks = 66.109.xxx.xxx, 127.0.0.0/8, 66.45.29.0/24, 66.9.31.0/24
mailbox_size_limit = 0
#smtpd_client_restrictions = permit_mynetworks, reject
#smtpd_recipient_restrictions = permit_mynetworks, reject_unauth_destination
recipient_delimiter = +
inet_interfaces = all
notify_classes = bounce, 2bounce, delay, policy protocol, resource, software
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous,noplaintext
smtpd_sasl_application_name = smtpd
smtpd_sasl_local_domain = mailer.rdny.com
broken_sasl_auth_clients = no
smtpd_recipient_restrictions = permit_mynetworks,reject_unlisted_recipient,reject_non_fqdn_sender,reject_unknown_sender_domain,permit_sasl_authenticated,reject_unauth_destination,check_policy_service inet:127.0.0.1:60000,reject
理想情况下,我希望 saslauthd 能够在端口 25 和 587 上工作。有人可以指导我如何实现这一点吗?
编辑:这master.cf
也是我的。
#
# Postfix master process configuration file. For details on the format
# of the file, see the master(5) manual page (command: "man 5 master").
#
# Do not forget to execute "postfix reload" after editing this file.
#
# ==========================================================================
# service type private unpriv chroot wakeup maxproc command + args
# (yes) (yes) (yes) (never) (100)
# ==========================================================================
smtp inet n - - - - smtpd
submission inet n - - - - smtpd
-o smtpd_tls_security_level=encrypt
-o smtpd_sasl_auth_enable=yes
-o smtpd_client_restrictions=permit_sasl_authenticated,reject
-o milter_macro_daemon_name=ORIGINATING
#smtps inet n - - - - smtpd
# -o smtpd_tls_wrappermode=yes
# -o smtpd_sasl_auth_enable=yes
# -o smtpd_client_restrictions=permit_sasl_authenticated,reject
# -o milter_macro_daemon_name=ORIGINATING
#628 inet n - - - - qmqpd
pickup fifo n - - 60 1 pickup
cleanup unix n - - - 0 cleanup
qmgr fifo n - n 300 1 qmgr
#qmgr fifo n - - 300 1 oqmgr
tlsmgr unix - - - 1000? 1 tlsmgr
rewrite unix - - - - - trivial-rewrite
bounce unix - - - - 0 bounce
defer unix - - - - 0 bounce
trace unix - - - - 0 bounce
verify unix - - - - 1 verify
flush unix n - - 1000? 0 flush
proxymap unix - - n - - proxymap
proxywrite unix - - n - 1 proxymap
smtp unix - - - - - smtp
# When relaying mail as backup MX, disable fallback_relay to avoid MX loops
relay unix - - - - - smtp
-o smtp_fallback_relay=
# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5
showq unix n - - - - showq
error unix - - - - - error
retry unix - - - - - error
discard unix - - - - - discard
local unix - n n - - local
virtual unix - n n - - virtual
lmtp unix - - - - - lmtp
anvil unix - - - - 1 anvil
scache unix - - - - 1 scache
#
# ====================================================================
# Interfaces to non-Postfix software. Be sure to examine the manual
# pages of the non-Postfix software to find out what options it wants.
#
# Many of the following services use the Postfix pipe(8) delivery
# agent. See the pipe(8) man page for information about ${recipient}
# and other message envelope options.
# ====================================================================
#
# maildrop. See the Postfix MAILDROP_README file for details.
# Also specify in main.cf: maildrop_destination_recipient_limit=1
#
maildrop unix - n n - - pipe
flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient}
#
# See the Postfix UUCP_README file for configuration details.
#
uucp unix - n n - - pipe
flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
#
# Other external delivery methods.
#
ifmail unix - n n - - pipe
flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
bsmtp unix - n n - - pipe
flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient scalemail-backend unix - n n - 2 pipe
flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
mailman unix - n n - - pipe
flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py
${nexthop} ${user}
### dkimproxy filter - see http://dkimproxy.sourceforge.net/postfix-outbound-howto.html
#
# modify the default submission service to specify a content filter
# and restrict it to local clients and SASL authenticated clients only
#
smtp inet n - n - - smtpd
-o smtpd_etrn_restrictions=reject
-o smtpd_sasl_auth_enable=yes
-o content_filter=dksign:[127.0.0.1]:10028
-o receive_override_options=no_address_mappings
-o smtpd_recipient_restrictions=permit_mynetworks,permit_sasl_authenticated,reject
# specify the location of the DKIM signing proxy
# Note: the smtp_discard_ehlo_keywords option requires a recent version of
# Postfix. Leave it off if your version does not support it.
dksign unix - - n - 10 smtp
-o smtp_send_xforward_command=yes
-o smtp_discard_ehlo_keywords=8bitmime,starttls
# service for accepting messages FROM the DKIM signing proxy
127.0.0.1:10029 inet n - n - 10 smtpd
-o content_filter=
-o receive_override_options=no_unknown_recipient_checks,no_header_body_checks
-o smtpd_helo_restrictions=
-o smtpd_client_restrictions=
-o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_mynetworks,reject
-o mynetworks=127.0.0.0/8
-o smtpd_authorized_xforward_hosts=127.0.0.0/8
答案1
您的 SASL 身份验证可能从未正常工作:日志摘录显示源 IP 为 66.109.xy,而这个 IP 也在 中mynetworks
。由于在您的smtpd_recipient_restrictions
前面permit_mynetworks
,permit_sasl_authenticated
您的测试客户端可能从未需要进行身份验证。
请将提交的第五列和 smtpd 设置为“n”,以master.cf
删除这两个服务的 chroot 并重新启动(而不是重新加载!)Postfix - 在验证存在/etc/sasldb2
并且用户postfix
是否可以读取它之前(并确保它包含有效的登录数据!)。
答案2
如果您跳过提交时的所有 -o smptd_ 内容,它会起作用吗?我会在没有这些设置的情况下测试中继,即使您可能短暂地处于开放中继状态。一旦您知道您实际上可以在端口 587 上中继,我就会开始一次添加它们。
您可能还想在 main.cf 中设置 smtpd_tls_loglevel = 3。请记住稍后将其注释掉。