Titanus Eramius:
> Fri, 22 Mar 2013 19:12:40 -0400 (EDT) skrev Wietse Venema
> <[email protected]>:
>
> > Test your lookups:
> >
> > postmap -q cogky.dk the-virtual_mailbox_domains-table
> > This should return a result (the value does not matter).
>
> aptget:~# postalias -q cogky.dk
> mysql:/etc/postfix/mysql_virtual_mailbox_domains.cf
> cogky.dk
>
> > postmap -q [email protected] the-virtual_mailbox_maps-table
> > This should return a result (the mailbox file name).
>
> aptget:~# postalias -q [email protected]
> mysql:/etc/postfix/mysql_virtual_mailbox_maps.cf
> cogky.dk/real-user/
>
> > postmap -q [email protected] the-virtual_mailbox_maps-table
> > This should return no result (Postfix treats this as "user unknown
> > in virtual mailbox table").
>
> And this does not return a result. Bash gives a error-status of 1.
OK, the table is working as it should. Now let's find out
why the bogus recipient is accepted:
Next step:
- Connect to the public (not content re-injection) SMTP port and try
$ telnet hostname 25
ehlo ...
mail from:<>
rcpt to:<[email protected]>
rcpt to:<[email protected]>
quit
One recipient should be accepted, the other not.
- Same experiment for mail over the submission port, if you have one:
$ openssl s_client -starttls smtp -connect hostname:587
ehlo ...
mail from:<>
rcpt to:<[email protected]>
rcpt to:<[email protected]>
quit
This is just in case.
Wietse