On Thu, Feb 07, 2013 at 06:22:40PM +0100, deconya wrote:
> smtp_sasl_password_maps = hash:/etc/postfix/relay_passwd
>
> relayhost = [smtp.puc.rediris.es]:25
Don't append :25 set:
relayhost = [smtp.puc.rediris.es]
> smtp_sasl_auth_enable = no
You've disabled SASL.
> smtp_sasl_password_maps = hash:/etc/postfix/relay_passwd
In this table the lookup key should be the verbatim setting of
relayhost:
[smtp.puc.rediris.es] user:pass
> smtp_sasl_security_options = noplaintext, noanonymous
> smtp_sasl_tls_security_options = $smtp_sasl_security_options
> smtp_sasl_tls_verified_security_options =
You only enable plaintext mechanisms (e.g. passwords) with verified
TLS. Are you able to verify the relay's TLS certificate?
> smtp_sasl_type = cyrus
> smtp_sender_dependent_authentication = yes
With this, the password table lookup key is the sender address. Is
that what you're using?
> smtp_tls_CAfile =
> smtp_tls_CApath =
How do you expect to verify the peer certificate? And without
verification, how do you expect to authenticate?
> smtp_tls_enforce_peername = yes
> smtp_use_tls = no
> smtp_tls_security_level =
The first two settings are obsolete. Set "smtp_tls_security_level = secure"
or at least "may" (and then enforce TLS for the relay via the policy table).
> smtp_tls_loglevel = 0
If you're using TLS, the recommended level is 1.
> smtp_tls_session_cache_database = btree:${queue_directory}/smtp_scache
The session cache database should be in ${data_directory}.
The "smtp_sasl_password_maps" parameter was introduced in snapshot-20000316,
(prior to Postfix 1.0), while "smtp_sender_dependent_authentication"
was introducted in postfix-2.3-20051125 (which later evolved into Postfix 2.3).
--
Viktor.