]> git.ipfire.org Git - thirdparty/postfix.git/commitdiff
snapshot-19990912
authorWietse Venema <wietse@porcupine.org>
Sun, 12 Sep 1999 05:00:00 +0000 (00:00 -0500)
committerWietse Venema <wietse@porcupine.org>
Thu, 17 Jan 2013 23:09:46 +0000 (18:09 -0500)
postfix/RELEASE_NOTES
postfix/global/mail_version.h

index 48ff15ebbf5d6662413a107e596bb40d7f6779cc..f1792aba7e799d83add2b0be988390cc9c7e30a2 100644 (file)
@@ -42,18 +42,9 @@ That should stop a lot of the mail to non-existent recipients.  It
 won't stop mail to broken aliases or to users with broken .forward
 files, though.
 
-For a relaying site, the best we can do is something like:
-
-    smtpd_recipient_restrictions =
-       permit_mynetworks
-       reject_unauth_destination
-       reject_unknown_sender_domain
-       ...other checks to reject non-FQDN, RBL, access maps...
-       permit_recipient_map unix:passwd.byname
-       permit_recipient_map hash:/etc/canonical
-       permit_recipient_map hash:/etc/postfix/virtual
-       permit_recipient_map hash:/etc/aliases
-       reject
+For a relaying site, a good configuration with permit_recipient_map
+still needs to be found. Something that permits relaying to all
+sites except $mydestination.
 
 Unfortunately, permit_recipient_map does not combine well with
 permit_mynetworks, because permit_mynetworks accepts mail for 
index fe393f6dcf530baf5d3e64be7499bc98e7af51d3..fff99cabfac0d2e134d60246e004aa461076112a 100644 (file)
@@ -15,7 +15,7 @@
   * Version of this program.
   */
 #define VAR_MAIL_VERSION       "mail_version"
-#define DEF_MAIL_VERSION       "Snapshot-19990911"
+#define DEF_MAIL_VERSION       "Snapshot-19990912"
 extern char *var_mail_version;
 
 /* LICENSE