On Mon, Dec 26, 2011 at 08:25:42PM -0600, Noel Jones wrote:
> The BOFH solution is a custom cleanup_service_name with alternate
> header_checks on the pickup service that removes user-supplied From:
> headers. Postfix will supply a standard header based on the UID.
IIRC this won't work. The defa
On 12/26/2011 6:33 PM, Wietse Venema wrote:
> Bart?omiej Roma?ski:
>>> 2. Limit shell users' access to sendmail(1) using
>>> authorized_submit_users:
>>
>> That would break, for example, the 'at' command. It would like to
>> allow my users to send emails. I just want to prevent them from faking
>>
Bart?omiej Roma?ski:
> > 2. Limit shell users' access to sendmail(1) using
> > authorized_submit_users:
>
> That would break, for example, the 'at' command. It would like to
> allow my users to send emails. I just want to prevent them from faking
> "sender" header.
>
> > 3. Alternatively, you cou
Thank you for your answer.
> UUOC, '/usr/sbin/sendmail -t t...@test.test < mail.txt' :)
I know it doesn't make sense. I just prefer reading from left to right.
> Note, this is controlling the envelope sender, not the From: header.
True, thanks.
> 1. Get rid of untrusted shell users. If you can
On Tuesday 20 December 2011 22:07:04 Bartłomiej Romański wrote:
> Is there a way to restrict the "From" field for messages sent with
> the command line tool "mail"?
>
> For messages sent with SMTP we can simply do this:
>
> http://www.postfix.org/SASL_README.html#server_sasl_authz_envelope
Note,
Hi
Is there a way to restrict the "From" field for messages sent with the
command line tool "mail"?
For messages sent with SMTP we can simply do this:
http://www.postfix.org/SASL_README.html#server_sasl_authz_envelope
and it works fine, but users can execute:
mail t...@test.test -a 'From: some