Viktor Dukhovni:
>
>
> > On Dec 29, 2017, at 11:51 AM, Wietse Venema <[email protected]> wrote:
> >
> > I think the biggest break is smtpd_relay_restrictions because that
> > was introduced before the compatibility_level safety net. You may
> > have to explictly set smtpd_relay_restrictions to empty.
>
> The default is:
>
> smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated,
> defer_unauth_destination
>
> Typically, it is sufficient to set:
>
> smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated,
> reject_unauth_destination
>
> and then optionally adjust smtpd_recipient_restrictions to eliminate the
> resulting duplication. You can of course continue to use just the latter,
> and set the former empty as noted by Wietse.
We could still cover smtpd_relay_restrictions under the compatibility
safety net, meaning that this log a warning if smtpd_relay_restrictions
would defer/reject mail and compatibility_level <1.
I don't think that would break anything.
Wietse