2020-06-08 16:57:40 +02:00
|
|
|
{% if postfix_delivery_soft_bounce %}
|
|
|
|
# SOFT BOUNCE
|
|
|
|
#
|
|
|
|
# The soft_bounce parameter provides a limited safety net for
|
|
|
|
# testing. When soft_bounce is enabled, mail will remain queued that
|
|
|
|
# would otherwise bounce. This parameter disables locally-generated
|
|
|
|
# bounces, and prevents the SMTP server from rejecting mail permanently
|
|
|
|
# (by changing 5xx replies into 4xx replies). However, soft_bounce
|
|
|
|
# is no cure for address rewriting mistakes or mail routing mistakes.
|
|
|
|
#
|
|
|
|
soft_bounce = yes
|
|
|
|
{% else %}
|
|
|
|
soft_bounce = no
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
queue_directory = /var/spool/postfix
|
|
|
|
command_directory = /usr/sbin
|
2020-07-18 18:04:53 +02:00
|
|
|
{% if ansible_distribution_file_variety == "RedHat" %}
|
2020-06-08 16:57:40 +02:00
|
|
|
daemon_directory = /usr/libexec/postfix
|
2020-07-18 18:04:53 +02:00
|
|
|
{% endif %}
|
2020-06-08 16:57:40 +02:00
|
|
|
data_directory = /var/lib/postfix
|
|
|
|
mail_owner = postfix
|
|
|
|
|
|
|
|
# The default_privs parameter specifies the default rights used by
|
|
|
|
# the local delivery agent for delivery to external file or command.
|
|
|
|
# These rights are used in the absence of a recipient user context.
|
|
|
|
# DO NOT SPECIFY A PRIVILEGED USER OR THE POSTFIX OWNER.
|
|
|
|
#
|
|
|
|
#default_privs = nobody
|
|
|
|
|
|
|
|
# INTERNET HOST AND DOMAIN NAMES
|
|
|
|
#
|
|
|
|
# The myhostname parameter specifies the internet hostname of this
|
|
|
|
# mail system. The default is to use the fully-qualified domain name
|
|
|
|
# from gethostname(). $myhostname is used as a default value for many
|
|
|
|
# other configuration parameters.
|
|
|
|
#
|
|
|
|
myhostname = {{ ansible_fqdn }}
|
2020-09-28 18:15:58 +02:00
|
|
|
{% if postfix_use_domain_name %}
|
|
|
|
mydomain = {% if domain_name is defined %}{{ domain_name }}{% else %}{{ ansible_fqdn }}{% endif %}
|
2020-06-08 16:57:40 +02:00
|
|
|
{% else %}
|
|
|
|
mydomain = {{ ansible_fqdn }}
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# SENDING MAIL
|
|
|
|
#
|
|
|
|
# The myorigin parameter specifies the domain that locally-posted
|
|
|
|
# mail appears to come from. The default is to append $myhostname,
|
|
|
|
# which is fine for small sites. If you run a domain with multiple
|
|
|
|
# machines, you should (1) change this to $mydomain and (2) set up
|
|
|
|
# a domain-wide alias database that aliases each user to
|
|
|
|
# user@that.users.mailhost.
|
|
|
|
#
|
|
|
|
# For the sake of consistency between sender and recipient addresses,
|
|
|
|
# myorigin also specifies the default domain name that is appended
|
|
|
|
# to recipient addresses that have no @domain part.
|
|
|
|
#
|
2020-09-28 18:15:58 +02:00
|
|
|
{% if postfix_use_domain_name %}
|
|
|
|
myorigin = {% if domain_name is defined %}{{ domain_name }}{% else %}{{ ansible_fqdn }}{% endif %}
|
2020-06-08 16:57:40 +02:00
|
|
|
{% else %}
|
|
|
|
myorigin = {{ ansible_fqdn }}
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# RECEIVING MAIL
|
|
|
|
|
|
|
|
# The inet_interfaces parameter specifies the network interface
|
|
|
|
# addresses that this mail system receives mail on. By default,
|
|
|
|
# the software claims all active interfaces on the machine. The
|
|
|
|
# parameter also controls delivery of mail to user@[ip.address].
|
|
|
|
#
|
|
|
|
# See also the proxy_interfaces parameter, for network addresses that
|
|
|
|
# are forwarded to us via a proxy or network address translator.
|
|
|
|
#
|
|
|
|
# Note: you need to stop/start Postfix when this parameter changes.
|
|
|
|
#
|
|
|
|
{% if postfix_use_inet_interfaces %}
|
|
|
|
{% if not postfix_smtpd_server %}
|
|
|
|
inet_interfaces = localhost
|
|
|
|
inet_protocols = ipv4
|
|
|
|
{% else %}
|
|
|
|
inet_interfaces = {% for int in postfix_inet_interfaces %}{{ int }}{% if not loop.last %}, {% endif %}{% endfor %}
|
|
|
|
|
|
|
|
inet_protocols = {% for proto in postfix_inet_protocols %}{{ proto }}{% if not loop.last %}, {% endif %}{% endfor %}
|
|
|
|
{% endif %}
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# The proxy_interfaces parameter specifies the network interface
|
|
|
|
# addresses that this mail system receives mail on by way of a
|
|
|
|
# proxy or network address translation unit. This setting extends
|
|
|
|
# the address list specified with the inet_interfaces parameter.
|
|
|
|
#
|
|
|
|
# You must specify your proxy/NAT addresses when your system is a
|
|
|
|
# backup MX host for other domains, otherwise mail delivery loops
|
|
|
|
# will happen when the primary MX host is down.
|
|
|
|
#
|
|
|
|
#proxy_interfaces =
|
|
|
|
#proxy_interfaces = 1.2.3.4
|
|
|
|
{% if postfix_proxy_interfaces_enabled %}
|
|
|
|
proxy_interfaces = {% for proxy_int in postfix_proxy_interfaces %}{{ proxy_int }} {% endfor %}
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# The mydestination parameter specifies the list of domains that this
|
|
|
|
# machine considers itself the final destination for.
|
|
|
|
#
|
|
|
|
# These domains are routed to the delivery agent specified with the
|
|
|
|
# local_transport parameter setting. By default, that is the UNIX
|
|
|
|
# compatible delivery agent that lookups all recipients in /etc/passwd
|
|
|
|
# and /etc/aliases or their equivalent.
|
|
|
|
#
|
|
|
|
# The default is $myhostname + localhost.$mydomain. On a mail domain
|
|
|
|
# gateway, you should also include $mydomain.
|
|
|
|
#
|
|
|
|
# Do not specify the names of virtual domains - those domains are
|
|
|
|
# specified elsewhere (see VIRTUAL_README).
|
|
|
|
#
|
|
|
|
# Do not specify the names of domains that this machine is backup MX
|
|
|
|
# host for. Specify those names via the relay_domains settings for
|
|
|
|
# the SMTP server, or use permit_mx_backup if you are lazy (see
|
|
|
|
# STANDARD_CONFIGURATION_README).
|
|
|
|
#
|
|
|
|
# The local machine is always the final destination for mail addressed
|
|
|
|
# to user@[the.net.work.address] of an interface that the mail system
|
|
|
|
# receives mail on (see the inet_interfaces parameter).
|
|
|
|
#
|
|
|
|
# Specify a list of host or domain names, /file/name or type:table
|
|
|
|
# patterns, separated by commas and/or whitespace. A /file/name
|
|
|
|
# pattern is replaced by its contents; a type:table is matched when
|
|
|
|
# a name matches a lookup key (the right-hand side is ignored).
|
|
|
|
# Continue long lines by starting the next line with whitespace.
|
|
|
|
#
|
|
|
|
# See also below, section "REJECTING MAIL FOR UNKNOWN LOCAL USERS".
|
|
|
|
#
|
2020-09-28 18:15:58 +02:00
|
|
|
{% if postfix_use_domain_name %}
|
|
|
|
mydestination = {{ ansible_fqdn }}, localhost, {% if domain_name is defined %}{{ domain_name }}{% endif %}
|
2020-06-08 16:57:40 +02:00
|
|
|
{% else %}
|
2020-09-28 18:15:58 +02:00
|
|
|
mydestination = {% if postfix_local_recipients %}{{ ansible_fqdn }},{% endif %} localhost
|
2020-06-08 16:57:40 +02:00
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# REJECTING MAIL FOR UNKNOWN LOCAL USERS
|
|
|
|
#
|
|
|
|
# The local_recipient_maps parameter specifies optional lookup tables
|
|
|
|
# with all names or addresses of users that are local with respect
|
|
|
|
# to $mydestination, $inet_interfaces or $proxy_interfaces.
|
|
|
|
#
|
|
|
|
# If this parameter is defined, then the SMTP server will reject
|
|
|
|
# mail for unknown local users. This parameter is defined by default.
|
|
|
|
#
|
|
|
|
# To turn off local recipient checking in the SMTP server, specify
|
|
|
|
# local_recipient_maps = (i.e. empty).
|
|
|
|
#
|
|
|
|
# The default setting assumes that you use the default Postfix local
|
|
|
|
# delivery agent for local delivery. You need to update the
|
|
|
|
# local_recipient_maps setting if:
|
|
|
|
#
|
|
|
|
# - You define $mydestination domain recipients in files other than
|
|
|
|
# /etc/passwd, /etc/aliases, or the $virtual_alias_maps files.
|
|
|
|
# For example, you define $mydestination domain recipients in
|
|
|
|
# the $virtual_mailbox_maps files.
|
|
|
|
#
|
|
|
|
# - You redefine the local delivery agent in master.cf.
|
|
|
|
#
|
|
|
|
# - You redefine the "local_transport" setting in main.cf.
|
|
|
|
#
|
|
|
|
# - You use the "luser_relay", "mailbox_transport", or "fallback_transport"
|
|
|
|
# feature of the Postfix local delivery agent (see local(8)).
|
|
|
|
#
|
|
|
|
# Details are described in the LOCAL_RECIPIENT_README file.
|
|
|
|
#
|
|
|
|
# Beware: if the Postfix SMTP server runs chrooted, you probably have
|
|
|
|
# to access the passwd file via the proxymap service, in order to
|
|
|
|
# overcome chroot restrictions. The alternative, having a copy of
|
|
|
|
# the system passwd file in the chroot jail is just not practical.
|
|
|
|
#
|
|
|
|
# The right-hand side of the lookup tables is conveniently ignored.
|
|
|
|
# In the left-hand side, specify a bare username, an @domain.tld
|
|
|
|
# wild-card, or specify a user@domain.tld address.
|
|
|
|
#
|
|
|
|
#local_recipient_maps = unix:passwd.byname $alias_maps
|
|
|
|
#local_recipient_maps = proxy:unix:passwd.byname $alias_maps
|
|
|
|
{% if postfix_virtual_transport_enabled %}
|
|
|
|
local_recipient_maps =
|
|
|
|
{% elif not postfix_local_recipients %}
|
|
|
|
#local_recipient_maps =
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# The unknown_local_recipient_reject_code specifies the SMTP server
|
|
|
|
# response code when a recipient domain matches $mydestination or
|
|
|
|
# ${proxy,inet}_interfaces, while $local_recipient_maps is non-empty
|
|
|
|
# and the recipient address or address local-part is not found.
|
|
|
|
#
|
|
|
|
# The default setting is 550 (reject mail) but it is safer to start
|
|
|
|
# with 450 (try again later) until you are certain that your
|
|
|
|
# local_recipient_maps settings are OK.
|
|
|
|
#
|
|
|
|
{% if postfix_delivery_soft_bounce %}
|
|
|
|
unknown_local_recipient_reject_code = 450
|
|
|
|
{% else %}
|
|
|
|
unknown_local_recipient_reject_code = 550
|
|
|
|
{% endif %}
|
|
|
|
# TRUST AND RELAY CONTROL
|
|
|
|
|
|
|
|
# The mynetworks parameter specifies the list of "trusted" SMTP
|
|
|
|
# clients that have more privileges than "strangers".
|
|
|
|
#
|
|
|
|
# In particular, "trusted" SMTP clients are allowed to relay mail
|
|
|
|
# through Postfix. See the smtpd_recipient_restrictions parameter
|
|
|
|
# in postconf(5).
|
|
|
|
#
|
|
|
|
# You can specify the list of "trusted" network addresses by hand
|
|
|
|
# or you can let Postfix do it for you (which is the default).
|
|
|
|
#
|
|
|
|
# By default (mynetworks_style = subnet), Postfix "trusts" SMTP
|
|
|
|
# clients in the same IP subnetworks as the local machine.
|
|
|
|
# On Linux, this does works correctly only with interfaces specified
|
|
|
|
# with the "ifconfig" command.
|
|
|
|
#
|
|
|
|
# Specify "mynetworks_style = class" when Postfix should "trust" SMTP
|
|
|
|
# clients in the same IP class A/B/C networks as the local machine.
|
|
|
|
# Don't do this with a dialup site - it would cause Postfix to "trust"
|
|
|
|
# your entire provider's network. Instead, specify an explicit
|
|
|
|
# mynetworks list by hand, as described below.
|
|
|
|
#
|
|
|
|
# Specify "mynetworks_style = host" when Postfix should "trust"
|
|
|
|
# only the local machine.
|
|
|
|
#
|
|
|
|
#mynetworks_style = class
|
|
|
|
#mynetworks_style = subnet
|
|
|
|
#mynetworks_style = host
|
|
|
|
|
|
|
|
# Alternatively, you can specify the mynetworks list by hand, in
|
|
|
|
# which case Postfix ignores the mynetworks_style setting.
|
|
|
|
#
|
|
|
|
# Specify an explicit list of network/netmask patterns, where the
|
|
|
|
# mask specifies the number of bits in the network part of a host
|
|
|
|
# address.
|
|
|
|
#
|
|
|
|
# You can also specify the absolute pathname of a pattern file instead
|
|
|
|
# of listing the patterns here. Specify type:table for table-based lookups
|
|
|
|
# (the value on the table right-hand side is not used).
|
|
|
|
#
|
|
|
|
#mynetworks = 168.100.189.0/28, 127.0.0.0/8
|
|
|
|
#mynetworks = $config_directory/mynetworks
|
|
|
|
#mynetworks = hash:/etc/postfix/network_table
|
|
|
|
{% if not postfix_use_inet_interfaces %}
|
|
|
|
mynetworks = 127.0.0.0/8
|
|
|
|
{% else %}
|
|
|
|
mynetworks = {{ postfix_mynetworks }}
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# The relay_domains parameter restricts what destinations this system will
|
|
|
|
# relay mail to. See the smtpd_recipient_restrictions description in
|
|
|
|
# postconf(5) for detailed information.
|
|
|
|
#
|
|
|
|
# By default, Postfix relays mail
|
|
|
|
# - from "trusted" clients (IP address matches $mynetworks) to any destination,
|
|
|
|
# - from "untrusted" clients to destinations that match $relay_domains or
|
|
|
|
# subdomains thereof, except addresses with sender-specified routing.
|
|
|
|
# The default relay_domains value is $mydestination.
|
|
|
|
#
|
|
|
|
# In addition to the above, the Postfix SMTP server by default accepts mail
|
|
|
|
# that Postfix is final destination for:
|
|
|
|
# - destinations that match $inet_interfaces or $proxy_interfaces,
|
|
|
|
# - destinations that match $mydestination
|
|
|
|
# - destinations that match $virtual_alias_domains,
|
|
|
|
# - destinations that match $virtual_mailbox_domains.
|
|
|
|
# These destinations do not need to be listed in $relay_domains.
|
|
|
|
#
|
|
|
|
# Specify a list of hosts or domains, /file/name patterns or type:name
|
|
|
|
# lookup tables, separated by commas and/or whitespace. Continue
|
|
|
|
# long lines by starting the next line with whitespace. A file name
|
|
|
|
# is replaced by its contents; a type:name table is matched when a
|
|
|
|
# (parent) domain appears as lookup key.
|
|
|
|
#
|
|
|
|
# NOTE: Postfix will not automatically forward mail for domains that
|
|
|
|
# list this system as their primary or backup MX host. See the
|
|
|
|
# permit_mx_backup restriction description in postconf(5).
|
|
|
|
#
|
|
|
|
#relay_domains = $mydestination
|
|
|
|
|
|
|
|
# INTERNET OR INTRANET
|
|
|
|
|
|
|
|
# The relayhost parameter specifies the default host to send mail to
|
|
|
|
# when no entry is matched in the optional transport(5) table. When
|
|
|
|
# no relayhost is given, mail is routed directly to the destination.
|
|
|
|
#
|
|
|
|
# On an intranet, specify the organizational domain name. If your
|
|
|
|
# internal DNS uses no MX records, specify the name of the intranet
|
|
|
|
# gateway host instead.
|
|
|
|
#
|
|
|
|
# In the case of SMTP, specify a domain, host, host:port, [host]:port,
|
|
|
|
# [address] or [address]:port; the form [host] turns off MX lookups.
|
|
|
|
#
|
|
|
|
# If you're connected via UUCP, see also the default_transport parameter.
|
|
|
|
#
|
|
|
|
{% if postfix_use_relay_host %}
|
|
|
|
relayhost = {{ postfix_relay_host }}:{{ postfix_relay_port }}
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# REJECTING UNKNOWN RELAY USERS
|
|
|
|
#
|
|
|
|
# The relay_recipient_maps parameter specifies optional lookup tables
|
|
|
|
# with all addresses in the domains that match $relay_domains.
|
|
|
|
#
|
|
|
|
# If this parameter is defined, then the SMTP server will reject
|
|
|
|
# mail for unknown relay users. This feature is off by default.
|
|
|
|
#
|
|
|
|
# The right-hand side of the lookup tables is conveniently ignored.
|
|
|
|
# In the left-hand side, specify an @domain.tld wild-card, or specify
|
|
|
|
# a user@domain.tld address.
|
|
|
|
#
|
|
|
|
#relay_recipient_maps = hash:/etc/postfix/relay_recipients
|
|
|
|
|
|
|
|
# INPUT RATE CONTROL
|
|
|
|
#
|
|
|
|
# The in_flow_delay configuration parameter implements mail input
|
|
|
|
# flow control. This feature is turned on by default, although it
|
|
|
|
# still needs further development (it's disabled on SCO UNIX due
|
|
|
|
# to an SCO bug).
|
|
|
|
#
|
|
|
|
# A Postfix process will pause for $in_flow_delay seconds before
|
|
|
|
# accepting a new message, when the message arrival rate exceeds the
|
|
|
|
# message delivery rate. With the default 100 SMTP server process
|
|
|
|
# limit, this limits the mail inflow to 100 messages a second more
|
|
|
|
# than the number of messages delivered per second.
|
|
|
|
#
|
|
|
|
# Specify 0 to disable the feature. Valid delays are 0..10.
|
|
|
|
#
|
|
|
|
#in_flow_delay = 1s
|
|
|
|
|
|
|
|
# ADDRESS REWRITING
|
|
|
|
#
|
|
|
|
# The ADDRESS_REWRITING_README document gives information about
|
|
|
|
# address masquerading or other forms of address rewriting including
|
|
|
|
# username->Firstname.Lastname mapping.
|
|
|
|
|
|
|
|
# ADDRESS REDIRECTION (VIRTUAL DOMAIN)
|
|
|
|
#
|
|
|
|
# The VIRTUAL_README document gives information about the many forms
|
|
|
|
# of domain hosting that Postfix supports.
|
|
|
|
|
|
|
|
# "USER HAS MOVED" BOUNCE MESSAGES
|
|
|
|
#
|
|
|
|
# See the discussion in the ADDRESS_REWRITING_README document.
|
|
|
|
|
|
|
|
# TRANSPORT MAP
|
|
|
|
#
|
|
|
|
# See the discussion in the ADDRESS_REWRITING_README document.
|
|
|
|
{% if postfix_transport_map_enabled %}
|
|
|
|
transport_maps = {% for tmap in postfix_transport_maps %}{{ tmap }}{% if not loop.last %}, {% endif %}{% endfor %}
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
|
|
|
|
# ALIAS DATABASE
|
|
|
|
#
|
|
|
|
# The alias_maps parameter specifies the list of alias databases used
|
|
|
|
# by the local delivery agent. The default list is system dependent.
|
|
|
|
#
|
|
|
|
# On systems with NIS, the default is to search the local alias
|
|
|
|
# database, then the NIS alias database. See aliases(5) for syntax
|
|
|
|
# details.
|
|
|
|
#
|
|
|
|
# If you change the alias database, run "postalias /etc/aliases" (or
|
|
|
|
# wherever your system stores the mail alias file), or simply run
|
|
|
|
# "newaliases" to build the necessary DBM or DB file.
|
|
|
|
#
|
|
|
|
# It will take a minute or so before changes become visible. Use
|
|
|
|
# "postfix reload" to eliminate the delay.
|
|
|
|
#
|
|
|
|
alias_maps = {% for alias in postfix_alias_maps %}{{ alias }}{% if not loop.last %}, {% endif %}{% endfor %}
|
|
|
|
|
|
|
|
# The alias_database parameter specifies the alias database(s) that
|
|
|
|
# are built with "newaliases" or "sendmail -bi". This is a separate
|
|
|
|
# configuration parameter, because alias_maps (see above) may specify
|
|
|
|
# tables that are not necessarily all under control by Postfix.
|
|
|
|
#
|
|
|
|
alias_database = {% for dbalias in postfix_alias_databases %}{{ dbalias }}{% if not loop.last %}, {% endif %}{% endfor %}
|
|
|
|
|
|
|
|
# ADDRESS EXTENSIONS (e.g., user+foo)
|
|
|
|
#
|
|
|
|
# The recipient_delimiter parameter specifies the separator between
|
|
|
|
# user names and address extensions (user+foo). See canonical(5),
|
|
|
|
# local(8), relocated(5) and virtual(5) for the effects this has on
|
|
|
|
# aliases, canonical, virtual, relocated and .forward file lookups.
|
|
|
|
# Basically, the software tries user+foo and .forward+foo before
|
|
|
|
# trying user and .forward.
|
|
|
|
#
|
|
|
|
recipient_delimiter = {{ postfix_recipient_delimiter }}
|
2022-06-06 13:00:51 +02:00
|
|
|
#
|
|
|
|
{% if postfix_srs_sender_enabled %}
|
|
|
|
# SRS sender
|
|
|
|
sender_canonical_maps = {{ postfix_sender_canonical_maps }}
|
|
|
|
sender_canonical_classes = envelope_sender
|
|
|
|
{% endif %}
|
|
|
|
{% if postfix_srs_receiver_enabled %}
|
|
|
|
# SRS recipient
|
|
|
|
recipient_canonical_maps = {{ postfix_recipient_canonical_maps }}
|
|
|
|
recipient_canonical_classes= envelope_recipient,header_recipient
|
|
|
|
{% endif %}
|
2020-06-08 16:57:40 +02:00
|
|
|
|
|
|
|
# DELIVERY TO MAILBOX
|
|
|
|
#
|
|
|
|
# The home_mailbox parameter specifies the optional pathname of a
|
|
|
|
# mailbox file relative to a user's home directory. The default
|
|
|
|
# mailbox file is /var/spool/mail/user or /var/mail/user. Specify
|
|
|
|
# "Maildir/" for qmail-style delivery (the / is required).
|
|
|
|
#
|
|
|
|
#home_mailbox = Mailbox
|
|
|
|
#home_mailbox = Maildir/
|
|
|
|
|
|
|
|
# The mail_spool_directory parameter specifies the directory where
|
|
|
|
# UNIX-style mailboxes are kept. The default setting depends on the
|
|
|
|
# system type.
|
|
|
|
#
|
|
|
|
#mail_spool_directory = /var/mail
|
|
|
|
#mail_spool_directory = /var/spool/mail
|
|
|
|
|
|
|
|
# The mailbox_command parameter specifies the optional external
|
|
|
|
# command to use instead of mailbox delivery. The command is run as
|
|
|
|
# the recipient with proper HOME, SHELL and LOGNAME environment settings.
|
|
|
|
# Exception: delivery for root is done as $default_user.
|
|
|
|
#
|
|
|
|
# Other environment variables of interest: USER (recipient username),
|
|
|
|
# EXTENSION (address extension), DOMAIN (domain part of address),
|
|
|
|
# and LOCAL (the address localpart).
|
|
|
|
#
|
|
|
|
# Unlike other Postfix configuration parameters, the mailbox_command
|
|
|
|
# parameter is not subjected to $parameter substitutions. This is to
|
|
|
|
# make it easier to specify shell syntax (see example below).
|
|
|
|
#
|
|
|
|
# Avoid shell meta characters because they will force Postfix to run
|
|
|
|
# an expensive shell process. Procmail alone is expensive enough.
|
|
|
|
#
|
|
|
|
# IF YOU USE THIS TO DELIVER MAIL SYSTEM-WIDE, YOU MUST SET UP AN
|
|
|
|
# ALIAS THAT FORWARDS MAIL FOR ROOT TO A REAL USER.
|
|
|
|
#
|
|
|
|
#mailbox_command = /some/where/procmail
|
|
|
|
#mailbox_command = /some/where/procmail -a "$EXTENSION"
|
|
|
|
|
|
|
|
# The mailbox_transport specifies the optional transport in master.cf
|
|
|
|
# to use after processing aliases and .forward files. This parameter
|
|
|
|
# has precedence over the mailbox_command, fallback_transport and
|
|
|
|
# luser_relay parameters.
|
|
|
|
#
|
|
|
|
# Specify a string of the form transport:nexthop, where transport is
|
|
|
|
# the name of a mail delivery transport defined in master.cf. The
|
|
|
|
# :nexthop part is optional. For more details see the sample transport
|
|
|
|
# configuration file.
|
|
|
|
#
|
|
|
|
# NOTE: if you use this feature for accounts not in the UNIX password
|
|
|
|
# file, then you must update the "local_recipient_maps" setting in
|
|
|
|
# the main.cf file, otherwise the SMTP server will reject mail for
|
|
|
|
# non-UNIX accounts with "User unknown in local recipient table".
|
|
|
|
#
|
|
|
|
# Cyrus IMAP over LMTP. Specify ``lmtpunix cmd="lmtpd"
|
|
|
|
# listen="/var/imap/socket/lmtp" prefork=0'' in cyrus.conf.
|
|
|
|
#mailbox_transport = lmtp:unix:/var/lib/imap/socket/lmtp
|
|
|
|
|
|
|
|
# If using the cyrus-imapd IMAP server deliver local mail to the IMAP
|
|
|
|
# server using LMTP (Local Mail Transport Protocol), this is prefered
|
|
|
|
# over the older cyrus deliver program by setting the
|
|
|
|
# mailbox_transport as below:
|
|
|
|
#
|
|
|
|
# mailbox_transport = lmtp:unix:/var/lib/imap/socket/lmtp
|
|
|
|
#
|
|
|
|
# The efficiency of LMTP delivery for cyrus-imapd can be enhanced via
|
|
|
|
# these settings.
|
|
|
|
#
|
|
|
|
# local_destination_recipient_limit = 300
|
|
|
|
# local_destination_concurrency_limit = 5
|
|
|
|
#
|
|
|
|
# Of course you should adjust these settings as appropriate for the
|
|
|
|
# capacity of the hardware you are using. The recipient limit setting
|
|
|
|
# can be used to take advantage of the single instance message store
|
|
|
|
# capability of Cyrus. The concurrency limit can be used to control
|
|
|
|
# how many simultaneous LMTP sessions will be permitted to the Cyrus
|
|
|
|
# message store.
|
|
|
|
#
|
|
|
|
# Cyrus IMAP via command line. Uncomment the "cyrus...pipe" and
|
|
|
|
# subsequent line in master.cf.
|
|
|
|
#mailbox_transport = cyrus
|
|
|
|
|
|
|
|
# The fallback_transport specifies the optional transport in master.cf
|
|
|
|
# to use for recipients that are not found in the UNIX passwd database.
|
|
|
|
# This parameter has precedence over the luser_relay parameter.
|
|
|
|
#
|
|
|
|
# Specify a string of the form transport:nexthop, where transport is
|
|
|
|
# the name of a mail delivery transport defined in master.cf. The
|
|
|
|
# :nexthop part is optional. For more details see the sample transport
|
|
|
|
# configuration file.
|
|
|
|
#
|
|
|
|
# NOTE: if you use this feature for accounts not in the UNIX password
|
|
|
|
# file, then you must update the "local_recipient_maps" setting in
|
|
|
|
# the main.cf file, otherwise the SMTP server will reject mail for
|
|
|
|
# non-UNIX accounts with "User unknown in local recipient table".
|
|
|
|
#
|
|
|
|
#fallback_transport = lmtp:unix:/var/lib/imap/socket/lmtp
|
|
|
|
#fallback_transport =
|
|
|
|
{% if postfix_virtual_transport_enabled %}
|
|
|
|
virtual_transport = {{ postfix_virtual_transport_protocol }}:{{ postfix_lmtp_protocol }}:{{ postfix_lmtp_host }}:{{ postfix_lmtp_port }}
|
|
|
|
|
|
|
|
virtual_mailbox_domains = {{ postfix_virtual_mailbox_domains }}
|
|
|
|
virtual_mailbox_maps = {% for mbmap in postfix_virtual_mailbox_maps %}{{ mbmap }} {% endfor %}
|
|
|
|
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
{% if postfix_virtual_domains %}
|
|
|
|
virtual_alias_domains = {{ postfix_virtual_alias_domains }}
|
|
|
|
{% endif %}
|
|
|
|
{% if postfix_virtual_addresses %}
|
|
|
|
virtual_alias_maps = {% for mbmap in postfix_virtual_alias_maps %}{{ mbmap }} {% endfor %}
|
|
|
|
|
|
|
|
virtual_mailbox_limit = {{ postfix_message_size_limit }}
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
# The luser_relay parameter specifies an optional destination address
|
|
|
|
# for unknown recipients. By default, mail for unknown@$mydestination,
|
|
|
|
# unknown@[$inet_interfaces] or unknown@[$proxy_interfaces] is returned
|
|
|
|
# as undeliverable.
|
|
|
|
#
|
|
|
|
# The following expansions are done on luser_relay: $user (recipient
|
|
|
|
# username), $shell (recipient shell), $home (recipient home directory),
|
|
|
|
# $recipient (full recipient address), $extension (recipient address
|
|
|
|
# extension), $domain (recipient domain), $local (entire recipient
|
|
|
|
# localpart), $recipient_delimiter. Specify ${name?value} or
|
|
|
|
# ${name:value} to expand value only when $name does (does not) exist.
|
|
|
|
#
|
|
|
|
# luser_relay works only for the default Postfix local delivery agent.
|
|
|
|
#
|
|
|
|
# NOTE: if you use this feature for accounts not in the UNIX password
|
|
|
|
# file, then you must specify "local_recipient_maps =" (i.e. empty) in
|
|
|
|
# the main.cf file, otherwise the SMTP server will reject mail for
|
|
|
|
# non-UNIX accounts with "User unknown in local recipient table".
|
|
|
|
#
|
|
|
|
#luser_relay = $user@other.host
|
|
|
|
#luser_relay = $local@other.host
|
|
|
|
#luser_relay = admin+$local
|
|
|
|
|
|
|
|
# JUNK MAIL CONTROLS
|
|
|
|
#
|
|
|
|
# The controls listed here are only a very small subset. The file
|
|
|
|
# SMTPD_ACCESS_README provides an overview.
|
|
|
|
|
|
|
|
# The header_checks parameter specifies an optional table with patterns
|
|
|
|
# that each logical message header is matched against, including
|
|
|
|
# headers that span multiple physical lines.
|
|
|
|
#
|
|
|
|
# By default, these patterns also apply to MIME headers and to the
|
|
|
|
# headers of attached messages. With older Postfix versions, MIME and
|
|
|
|
# attached message headers were treated as body text.
|
|
|
|
#
|
|
|
|
# For details, see "man header_checks".
|
|
|
|
#
|
|
|
|
#header_checks = regexp:/etc/postfix/header_checks
|
|
|
|
|
|
|
|
#
|
|
|
|
# UCE/RBL
|
|
|
|
#
|
2020-08-11 17:47:21 +02:00
|
|
|
disable_vrfy_command = {{ postfix_smtp_disable_vrfy }}
|
|
|
|
smtpd_delay_reject = {{ postfix_smtp_delay_reject }}
|
|
|
|
smtpd_helo_required = {{ postfix_smtp_helo_required }}
|
2020-06-08 16:57:40 +02:00
|
|
|
|
|
|
|
mailbox_size_limit = {{ postfix_message_size_limit }}
|
|
|
|
message_size_limit = {{ postfix_message_size_limit }}
|
|
|
|
|
|
|
|
{% if postfix_use_milter %}
|
|
|
|
#
|
|
|
|
# MILTER CONFIGURATION
|
|
|
|
#
|
|
|
|
# clamav, milter-greylist, spamassassin
|
|
|
|
#
|
2020-06-12 20:45:48 +02:00
|
|
|
#milter_connect_timeout = {{ postfix_milter_connect_timeout }}
|
|
|
|
#milter_command_timeout = {{ postfix_milter_command_timeout }}
|
|
|
|
#milter_content_timeout = {{ postfix_milter_content_timeout }}
|
2020-06-08 16:57:40 +02:00
|
|
|
# The default is 6
|
|
|
|
#milter_protocol = 6
|
|
|
|
{% if postfix_spamassassin_milter %}
|
|
|
|
# spamassassin wants _
|
|
|
|
milter_connect_macros = j {daemon_name} v _
|
|
|
|
{% endif %}
|
|
|
|
# What to do in case of errors? Specify accept, reject, tempfail,
|
|
|
|
# or quarantine (Postfix 2.6 or later).
|
|
|
|
milter_default_action = {{ postfix_milter_action }}
|
|
|
|
smtpd_milters =
|
|
|
|
{% if postfix_clamav_milter %}
|
|
|
|
{{ postfix_clamav_milter_socket }}
|
|
|
|
{% endif %}
|
|
|
|
{% if postfix_spamassassin_milter %}
|
|
|
|
{{ postfix_spamassassin_milter_socket }}
|
|
|
|
{% endif %}
|
2022-06-01 17:09:07 +02:00
|
|
|
{% if postfix_dkim_enabled %}
|
|
|
|
{{ postfix_dkim_milter_socket }}
|
|
|
|
{% endif %}
|
|
|
|
{% if postfix_dkim_enabled %}
|
|
|
|
non_smtpd_milters =
|
|
|
|
{{ postfix_dkim_milter_socket }}
|
|
|
|
{% endif %}
|
2020-06-08 16:57:40 +02:00
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
{% if postfix_smtpd_server %}
|
2021-12-04 17:00:51 +01:00
|
|
|
{% if postfix_helo_restrictions %}
|
|
|
|
smtpd_helo_restrictions =
|
|
|
|
permit_mynetworks
|
|
|
|
reject_invalid_helo_hostname
|
|
|
|
reject_non_fqdn_helo_hostname
|
|
|
|
reject_unknown_helo_hostname
|
|
|
|
{% endif %}
|
|
|
|
|
2020-06-12 20:45:48 +02:00
|
|
|
smtpd_recipient_restrictions =
|
2020-08-11 17:59:44 +02:00
|
|
|
{% for recipient_rule in postfix_smtpd_server_restrictions %}
|
|
|
|
{{ recipient_rule }}
|
|
|
|
{% endfor %}
|
2021-12-05 16:08:15 +01:00
|
|
|
{% if postfix_spf_policy_install %}
|
|
|
|
check_policy_service unix:private/policyd-spf
|
|
|
|
{% endif %}
|
2020-12-23 15:28:48 +01:00
|
|
|
{% if postfix_spamhaus_dbl_enabled %}
|
|
|
|
reject_rhsbl_helo dbl.spamhaus.org
|
|
|
|
reject_rhsbl_reverse_client dbl.spamhaus.org
|
|
|
|
reject_rhsbl_sender dbl.spamhaus.org
|
|
|
|
{% endif %}
|
2020-06-12 20:45:48 +02:00
|
|
|
{% if postfix_rbl_enabled %}
|
|
|
|
reject_rbl_client {{ postfix_rbl_list }}
|
|
|
|
{% endif %}
|
|
|
|
|
2020-06-08 16:57:40 +02:00
|
|
|
smtpd_client_restrictions =
|
2020-06-12 20:45:48 +02:00
|
|
|
permit_mynetworks
|
|
|
|
permit_inet_interfaces
|
2020-06-08 16:57:40 +02:00
|
|
|
{% if postfix_submission_server %}
|
2020-06-12 20:45:48 +02:00
|
|
|
permit_sasl_authenticated
|
2020-06-08 16:57:40 +02:00
|
|
|
{% endif %}
|
|
|
|
{% if postfix_mx_server %}
|
2020-08-11 17:59:44 +02:00
|
|
|
{% for client_rule in postfix_smtpd_mx_client_restrictions %}
|
|
|
|
{{ client_rule }}
|
|
|
|
{% endfor %}
|
2020-12-23 15:28:48 +01:00
|
|
|
{% if postfix_spamhaus_dbl_enabled %}
|
|
|
|
reject_rhsbl_helo dbl.spamhaus.org
|
|
|
|
reject_rhsbl_reverse_client dbl.spamhaus.org
|
|
|
|
reject_rhsbl_sender dbl.spamhaus.org
|
|
|
|
{% endif %}
|
2020-06-08 16:57:40 +02:00
|
|
|
{% if postfix_rbl_enabled %}
|
2020-06-12 20:45:48 +02:00
|
|
|
reject_rbl_client {{ postfix_rbl_list }}
|
2020-06-08 16:57:40 +02:00
|
|
|
{% endif %}
|
|
|
|
{% endif %}
|
|
|
|
{% if postfix_mx_server %}
|
2020-06-12 20:45:48 +02:00
|
|
|
permit
|
2020-06-08 16:57:40 +02:00
|
|
|
{% else %}
|
2020-06-12 20:45:48 +02:00
|
|
|
reject
|
2020-06-08 16:57:40 +02:00
|
|
|
{% endif %}
|
|
|
|
{% if postfix_submission_server %}
|
|
|
|
smtpd_sasl_path = smtpd
|
|
|
|
smtpd_sasl_auth_enable = yes
|
|
|
|
smtpd_sasl_security_options = {{ postfix_smtp_sasl_security_options }}
|
|
|
|
smtpd_sasl_tls_security_options = {{ postfix_smtp_sasl_tls_security_options }}
|
|
|
|
smtpd_sasl_authenticated_header = yes
|
|
|
|
broken_sasl_auth_clients = yes
|
|
|
|
# Block clients that speak too early.
|
|
|
|
smtpd_data_restrictions = reject_unauth_pipelining
|
|
|
|
{% endif %}
|
2020-10-21 19:29:56 +02:00
|
|
|
{% if postfix_reject_sender_login_mismatch %}
|
2021-04-30 12:07:19 +02:00
|
|
|
smtpd_sender_login_maps =
|
2020-10-21 19:29:56 +02:00
|
|
|
{% for login_map in postfix_smtpd_sender_login_maps %}
|
|
|
|
{{ login_map }}
|
|
|
|
{% endfor %}
|
|
|
|
|
|
|
|
{% endif %}
|
|
|
|
|
2020-06-08 16:57:40 +02:00
|
|
|
{% if postfix_smtpd_reject_unknown_helo_hostname %}
|
|
|
|
# Don't talk to mail systems that don't know their own hostname. Use with care: it breaks most dialup setups
|
|
|
|
smtpd_helo_restrictions = reject_unknown_helo_hostname
|
|
|
|
{% endif %}
|
2020-10-21 19:29:56 +02:00
|
|
|
{% if postfix_smtpd_sender_restrictions %}
|
|
|
|
# Do not accept everything
|
2020-06-12 20:45:48 +02:00
|
|
|
smtpd_sender_restrictions =
|
2020-10-21 19:29:56 +02:00
|
|
|
{% if postfix_reject_unknown_sender_domain %}
|
2020-06-12 20:45:48 +02:00
|
|
|
reject_unknown_sender_domain
|
|
|
|
reject_non_fqdn_sender
|
2020-06-08 16:57:40 +02:00
|
|
|
{% endif %}
|
2020-10-21 19:29:56 +02:00
|
|
|
{% if postfix_reject_sender_login_mismatch %}
|
|
|
|
reject_sender_login_mismatch
|
|
|
|
{% endif %}
|
|
|
|
{% for rule in postfix_smtpd_additional_sender_restrictions %}
|
|
|
|
{{ rule }}
|
|
|
|
{% endfor %}
|
|
|
|
{% endif %}
|
|
|
|
|
2020-06-08 16:57:40 +02:00
|
|
|
{% if postfix_submission_server %}
|
|
|
|
# Relay control: local clients and
|
|
|
|
# authenticated clients may specify any destination domain.
|
2020-06-12 20:45:48 +02:00
|
|
|
smtpd_relay_restrictions =
|
|
|
|
permit_sasl_authenticated
|
|
|
|
reject
|
2020-06-08 16:57:40 +02:00
|
|
|
{% endif %}
|
|
|
|
{% if postfix_behind_haproxy %}
|
2020-06-12 20:45:48 +02:00
|
|
|
smtpd_upstream_proxy_protocol = haproxy
|
2020-06-08 16:57:40 +02:00
|
|
|
{% endif %}
|
|
|
|
{% endif %}
|
|
|
|
|
2020-06-23 14:05:22 +02:00
|
|
|
{% if postfix_add_missing_headers %}
|
|
|
|
local_header_rewrite_clients =
|
|
|
|
permit_inet_interfaces
|
|
|
|
{% if postfix_submission_server %}
|
|
|
|
permit_sasl_authenticated
|
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
always_add_missing_headers = yes
|
|
|
|
{% endif %}
|
|
|
|
|
2020-06-08 16:57:40 +02:00
|
|
|
# FAST ETRN SERVICE
|
|
|
|
#
|
|
|
|
# Postfix maintains per-destination logfiles with information about
|
|
|
|
# deferred mail, so that mail can be flushed quickly with the SMTP
|
|
|
|
# "ETRN domain.tld" command, or by executing "sendmail -qRdomain.tld".
|
|
|
|
# See the ETRN_README document for a detailed description.
|
|
|
|
#
|
|
|
|
# The fast_flush_domains parameter controls what destinations are
|
|
|
|
# eligible for this service. By default, they are all domains that
|
|
|
|
# this server is willing to relay mail to.
|
|
|
|
#
|
|
|
|
#fast_flush_domains = $relay_domains
|
|
|
|
|
|
|
|
# SHOW SOFTWARE VERSION OR NOT
|
|
|
|
#
|
|
|
|
# The smtpd_banner parameter specifies the text that follows the 220
|
|
|
|
# code in the SMTP server's greeting banner. Some people like to see
|
|
|
|
# the mail version advertised. By default, Postfix shows no version.
|
|
|
|
#
|
|
|
|
# You MUST specify $myhostname at the start of the text. That is an
|
|
|
|
# RFC requirement. Postfix itself does not care.
|
|
|
|
#
|
|
|
|
#smtpd_banner = $myhostname ESMTP $mail_name ($mail_version)
|
|
|
|
smtpd_banner = $myhostname ESMTP $mail_name
|
|
|
|
|
|
|
|
# PARALLEL DELIVERY TO THE SAME DESTINATION
|
|
|
|
#
|
|
|
|
# How many parallel deliveries to the same user or domain? With local
|
|
|
|
# delivery, it does not make sense to do massively parallel delivery
|
|
|
|
# to the same user, because mailbox updates must happen sequentially,
|
|
|
|
# and expensive pipelines in .forward files can cause disasters when
|
|
|
|
# too many are run at the same time. With SMTP deliveries, 10
|
|
|
|
# simultaneous connections to the same domain could be sufficient to
|
|
|
|
# raise eyebrows.
|
|
|
|
#
|
|
|
|
# Each message delivery transport has its XXX_destination_concurrency_limit
|
|
|
|
# parameter. The default is $default_destination_concurrency_limit for
|
|
|
|
# most delivery transports. For the local delivery agent the default is 2.
|
|
|
|
|
|
|
|
local_destination_concurrency_limit = {{ postfix_local_dest_concurrency_limit }}
|
|
|
|
default_destination_concurrency_limit = {{ postfix_default_destination_concurrency_limit }}
|
2023-07-26 15:29:33 +02:00
|
|
|
smtp_destination_concurrency_limit = {{ postfix_smtp_destination_concurrency_limit }}
|
|
|
|
|
|
|
|
{% if postfix_enforce_users_rate_limiting %}
|
|
|
|
# Other rate limiting parameters
|
|
|
|
smtpd_client_message_rate_limit = {{ postfix_smtpd_client_message_rate_limit }}
|
|
|
|
anvil_rate_time_unit = {{ postfix_anvil_rate_time_unit }}
|
|
|
|
default_destination_rate_delay = {{ postfix_default_destination_rate_delay }}
|
|
|
|
default_destination_recipient_limit = {{ postfix_default_destination_recipient_limit }}
|
|
|
|
{% endif %}
|
2020-06-08 16:57:40 +02:00
|
|
|
|
|
|
|
# DEBUGGING CONTROL
|
|
|
|
#
|
|
|
|
# The debug_peer_level parameter specifies the increment in verbose
|
|
|
|
# logging level when an SMTP client or server host name or address
|
|
|
|
# matches a pattern in the debug_peer_list parameter.
|
|
|
|
#
|
|
|
|
debug_peer_level = 2
|
|
|
|
|
|
|
|
# The debug_peer_list parameter specifies an optional list of domain
|
|
|
|
# or network patterns, /file/name patterns or type:name tables. When
|
|
|
|
# an SMTP client or server host name or address matches a pattern,
|
|
|
|
# increase the verbose logging level by the amount specified in the
|
|
|
|
# debug_peer_level parameter.
|
|
|
|
#
|
|
|
|
#debug_peer_list = 127.0.0.1
|
|
|
|
#debug_peer_list = some.domain
|
|
|
|
|
|
|
|
# The debugger_command specifies the external command that is executed
|
|
|
|
# when a Postfix daemon program is run with the -D option.
|
|
|
|
#
|
|
|
|
# Use "command .. & sleep 5" so that the debugger can attach before
|
|
|
|
# the process marches on. If you use an X-based debugger, be sure to
|
|
|
|
# set up your XAUTHORITY environment variable before starting Postfix.
|
|
|
|
#
|
|
|
|
#debugger_command =
|
|
|
|
# PATH=/bin:/usr/bin:/usr/local/bin:/usr/X11R6/bin
|
|
|
|
# ddd $daemon_directory/$process_name $process_id & sleep 5
|
|
|
|
|
|
|
|
# If you can't use X, use this to capture the call stack when a
|
|
|
|
# daemon crashes. The result is in a file in the configuration
|
|
|
|
# directory, and is named after the process name and the process ID.
|
|
|
|
#
|
|
|
|
# debugger_command =
|
|
|
|
# PATH=/bin:/usr/bin:/usr/local/bin; export PATH; (echo cont;
|
|
|
|
# echo where) | gdb $daemon_directory/$process_name $process_id 2>&1
|
|
|
|
# >$config_directory/$process_name.$process_id.log & sleep 5
|
|
|
|
#
|
|
|
|
# Another possibility is to run gdb under a detached screen session.
|
|
|
|
# To attach to the screen sesssion, su root and run "screen -r
|
|
|
|
# <id_string>" where <id_string> uniquely matches one of the detached
|
|
|
|
# sessions (from "screen -list").
|
|
|
|
#
|
|
|
|
# debugger_command =
|
|
|
|
# PATH=/bin:/usr/bin:/sbin:/usr/sbin; export PATH; screen
|
|
|
|
# -dmS $process_name gdb $daemon_directory/$process_name
|
|
|
|
# $process_id & sleep 1
|
|
|
|
|
|
|
|
# INSTALL-TIME CONFIGURATION INFORMATION
|
|
|
|
#
|
|
|
|
# The following parameters are used when installing a new Postfix version.
|
|
|
|
#
|
|
|
|
# sendmail_path: The full pathname of the Postfix sendmail command.
|
|
|
|
# This is the Sendmail-compatible mail posting interface.
|
|
|
|
#
|
|
|
|
sendmail_path = /usr/sbin/sendmail.postfix
|
|
|
|
|
|
|
|
# newaliases_path: The full pathname of the Postfix newaliases command.
|
|
|
|
# This is the Sendmail-compatible command to build alias databases.
|
|
|
|
#
|
|
|
|
newaliases_path = /usr/bin/newaliases.postfix
|
|
|
|
|
|
|
|
# mailq_path: The full pathname of the Postfix mailq command. This
|
|
|
|
# is the Sendmail-compatible mail queue listing command.
|
|
|
|
#
|
|
|
|
mailq_path = /usr/bin/mailq.postfix
|
|
|
|
|
|
|
|
# setgid_group: The group for mail submission and queue management
|
|
|
|
# commands. This must be a group name with a numerical group ID that
|
|
|
|
# is not shared with other accounts, not even with the Postfix account.
|
|
|
|
#
|
|
|
|
setgid_group = postdrop
|
|
|
|
|
|
|
|
# html_directory: The location of the Postfix HTML documentation.
|
|
|
|
#
|
|
|
|
html_directory = no
|
|
|
|
|
|
|
|
# manpage_directory: The location of the Postfix on-line manual pages.
|
|
|
|
#
|
|
|
|
manpage_directory = /usr/share/man
|
|
|
|
|
|
|
|
# readme_directory: The location of the Postfix README files.
|
|
|
|
#
|
|
|
|
readme_directory = no
|
|
|
|
|
|
|
|
# TLS parameters
|
|
|
|
{% if letsencrypt_acme_install is defined %}
|
|
|
|
{% if postfix_use_letsencrypt %}
|
|
|
|
smtpd_tls_CAfile={{ letsencrypt_acme_certs_dir }}/fullchain
|
|
|
|
smtpd_tls_cert_file={{ letsencrypt_acme_certs_dir }}/fullchain
|
|
|
|
smtpd_tls_key_file={{ letsencrypt_acme_certs_dir }}/privkey
|
|
|
|
{% else %}
|
|
|
|
smtpd_tls_CAfile=/etc/ssl/certs/ssl-cert-snakeoil.pem
|
|
|
|
smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
|
|
|
|
smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
|
|
|
|
{% endif %}
|
|
|
|
{% endif %}
|
|
|
|
{% if letsencrypt_acme_install is not defined %}
|
|
|
|
smtpd_tls_CAfile=/etc/ssl/certs/ssl-cert-snakeoil.pem
|
|
|
|
smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
|
|
|
|
smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
|
|
|
|
{% endif %}
|
|
|
|
{% if postfix_tls_encryption_level == 'intermediate' %}
|
|
|
|
# 2019-12-11, https://ssl-config.mozilla.org/#server=postfix&server-version=2.10.1&config=intermediate&openssl-version=1.0.2k
|
|
|
|
smtpd_use_tls = yes
|
|
|
|
smtpd_tls_security_level = {{ postfix_smtpd_tls_security_level }}
|
|
|
|
{% if postfix_smtpd_server %}
|
|
|
|
smtpd_tls_auth_only = yes
|
|
|
|
{% endif %}
|
|
|
|
smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
|
|
|
|
smtpd_tls_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
|
|
|
|
smtpd_tls_mandatory_ciphers = medium
|
|
|
|
|
|
|
|
# curl https://ssl-config.mozilla.org/ffdhe2048.txt > /path/to/dhparam.pem
|
|
|
|
# not actually 1024 bits, this applies to all DHE >= 1024 bits
|
|
|
|
smtpd_tls_dh1024_param_file = {{ postfix_tls_dhparam_file }}
|
|
|
|
|
|
|
|
tls_medium_cipherlist = ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
|
|
|
|
tls_preempt_cipherlist = no
|
|
|
|
|
|
|
|
{% elif postfix_tls_encryption_level == 'old' %}
|
|
|
|
# 2019-12-11, https://ssl-config.mozilla.org/#server=postfix&server-version=2.10.1&config=old&openssl-version=1.0.2k
|
|
|
|
smtpd_use_tls = yes
|
|
|
|
smtpd_tls_security_level = {{ postfix_smtpd_tls_security_level }}
|
|
|
|
{% if postfix_smtpd_server %}
|
|
|
|
smtpd_tls_auth_only = yes
|
|
|
|
{% endif %}
|
|
|
|
smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3
|
|
|
|
smtpd_tls_protocols = !SSLv2, !SSLv3
|
|
|
|
smtpd_tls_mandatory_ciphers = medium
|
|
|
|
|
|
|
|
# openssl dhparam 1024 > /path/to/dhparam.pem
|
|
|
|
# not actually 1024 bits, this applies to all DHE >= 1024 bits
|
|
|
|
smtpd_tls_dh1024_param_file = {{ postfix_tls_dhparam_file }}
|
|
|
|
|
|
|
|
tls_medium_cipherlist = ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA
|
|
|
|
tls_preempt_cipherlist = yes
|
|
|
|
{% endif %}
|
|
|
|
# Server
|
|
|
|
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
|
|
|
|
# Client
|
|
|
|
smtp_tls_security_level = {{ postfix_smtp_tls_security_level }}
|
|
|
|
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
|
|
|
|
{% if ansible_distribution_file_variety == "Debian" %}
|
|
|
|
{% if ansible_distribution_version is version_compare('18.04', '>=') %}
|
|
|
|
compatibility_level=2
|
|
|
|
{% endif %}
|
|
|
|
{% endif %}
|