Vadim S. Ivanov:
> I agree. I looked at rfc4422. Treating identity in MAIL FROM command as
> sasl authenticated will violate rfc itself (no auth mechanisms was
> involved).
> I won't be able do run smtpd_sender_login_mismatch,
> smtpd_sender_login_maps checks.
>
>
> But rfc4954 section 5 states:
> The optional AUTH parameter to the MAIL FROM command allows
> cooperating agents in a trusted environment to communicate the
> authorization identity associated with individual messages.
>
> If the server trusts the authenticated identity of the client to
> assert that the message was originally submitted by the supplied
> <mailbox>, then the server SHOULD supply the same <mailbox> in
> an AUTH parameter when relaying the message to any other server
> which supports the AUTH extension.
>
> For this reason, servers that advertise support for this
> extension MUST support the AUTH parameter to the MAIL FROM
> command even when the client has not authenticated itself to the
> server.
>
> So dovecot authenticated user and relayed it's mail to postfix with
> "authorization identity" in MAIL FROM:
>
> MAIL FROM:<user@domain> AUTH=user@domain BODY=8BITMIME SIZE=1545
>
> Does postfix support this AUTH extension ?
Postfix allows the parameter, and discards the result.
> If it does, is it possible to run some checks against "authorization
> identity" to prevent sender address forgery? (in my case user logs in
> using full mail address, so usermailbox=userlogin)
No. Without authentication, the MAIL FROM AUTH parameter is just
a bunch of unauthenticated data.
Wietse