i have a running debian 8 system, sendmail was installed, i switched to postfix cuz i heard it is "easier", now i wanted the following options:
the system can send emails. Example: the server is a webserver with a homepage, if someone leaves a message on the homepage an email goes out to my private adress (WORKING)
the system can receive emails for the domain (admin@myhomepage.com) (WORKING)
the users can get their emails from outside via via pop3 / imap (WORKING)
the users can send emails from outside (NOT WORKING)
the users can send emails if they log in to the server via ssh or a webmail systen ON the server ( squirrelmail ) but i never managed to let users use android app
example: if i telnet to my debian server to port 25 SMTP and say
MAILFROM:mymail@mail.deRCPTTO:someone@yahoo.com
it is not allowed, relay is not allowed, its only allowed to send emails to this server ( RCPT TO: admin@myhomepage.com is allowed ) thats totally ok. i dont want to have an open relay spamming machine, but how do i manage to let AUTHENTICATED users send emails from outside the system via android apps etc.
next thing is: in my stupidity i started trying around with postfix settings and this:
and now my port 25 is totally blocked from outside, i can "nc localhost 25" from inside the system (localhost) but port 25 seems to be open outside, but not reachable / connection refused, like its blocked by a firewall, but it isnt blocked
i already googled for days now, before i messed around with this TLS settings and before port 25 was reachable from outside, i was able to telnet into the system and receive mails for all users.
i checked that postfix is listening on ALL devices, not only loopback or localhost
i checked firewall settings
i tried to disable TLS for SMTP (no luck, dont know if i know how to disable TLS again :D )
uninstall / reinstall sendmail ( classic ) and postfix
everything with no luck :( i can still send email from within the system but cant receive mails anymore nor telnet from a remote machine to myserver : 25 :(
fvsoftdev
Posts: 1
Joined: 2017-01-14 09:17
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Cut-n-paste from forum description :
This is not a general Postfix help forum - this is for the separate package PostfixAdmin which configures/maintains virtual domains & mailboxes using Postfix (plus MySQL or PostgreSQL, optionally maildrop, and Courier or Dovecot).
For Postfix help you should head over to postfix.org and check out the Postfix mailing lists.
You need two things set up : an authentication system, and appropriate rules to permit authenticated users to relay.
On the latter, in smtpd_recipient_restrictions you need (amongst other things) permit_sasl_authenticated which will bypass later checks.
On the authentication, can't rememebr much other than having installed libsasl2-modules, libsasl2-2, and sasl2-bin - it's a long tiem since I set this up !
NOTE: This is spearate to TLS config which is a matter of pointing Postfix at valid certificate chain file and key files. Optionally you can configure which ciphers to support to improve security. IIRC the stock installation supports TLS, but with a locally generated certificate.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Hi folks
many problems: :(
i have a running debian 8 system, sendmail was installed, i switched to postfix cuz i heard it is "easier", now i wanted the following options:
the users can send emails if they log in to the server via ssh or a webmail systen ON the server ( squirrelmail ) but i never managed to let users use android app
example: if i telnet to my debian server to port 25 SMTP and say
it is not allowed, relay is not allowed, its only allowed to send emails to this server ( RCPT TO: admin@myhomepage.com is allowed ) thats totally ok. i dont want to have an open relay spamming machine, but how do i manage to let AUTHENTICATED users send emails from outside the system via android apps etc.
next thing is: in my stupidity i started trying around with postfix settings and this:
https://workaround.org/ispmail/jessie/relaying-smtp-authentication
and now my port 25 is totally blocked from outside, i can "nc localhost 25" from inside the system (localhost) but port 25 seems to be open outside, but not reachable / connection refused, like its blocked by a firewall, but it isnt blocked
my settings:
i already googled for days now, before i messed around with this TLS settings and before port 25 was reachable from outside, i was able to telnet into the system and receive mails for all users.
i checked that postfix is listening on ALL devices, not only loopback or localhost
i checked firewall settings
i tried to disable TLS for SMTP (no luck, dont know if i know how to disable TLS again :D )
uninstall / reinstall sendmail ( classic ) and postfix
everything with no luck :( i can still send email from within the system but cant receive mails anymore nor telnet from a remote machine to myserver : 25 :(
fvsoftdev
Posts: 1
Joined: 2017-01-14 09:17
Cut-n-paste from forum description :
This is not a general Postfix help forum - this is for the separate package PostfixAdmin which configures/maintains virtual domains & mailboxes using Postfix (plus MySQL or PostgreSQL, optionally maildrop, and Courier or Dovecot).
For Postfix help you should head over to postfix.org and check out the Postfix mailing lists.
You need two things set up : an authentication system, and appropriate rules to permit authenticated users to relay.
On the latter, in smtpd_recipient_restrictions you need (amongst other things) permit_sasl_authenticated which will bypass later checks.
On the authentication, can't rememebr much other than having installed libsasl2-modules, libsasl2-2, and sasl2-bin - it's a long tiem since I set this up !
NOTE: This is spearate to TLS config which is a matter of pointing Postfix at valid certificate chain file and key files. Optionally you can configure which ciphers to support to improve security. IIRC the stock installation supports TLS, but with a locally generated certificate.