1 (edited by mike_theknife 2016-07-19 01:53:32)

Topic: Exchange Server - POP Connector - Error 553

======== Required information ====
- iRedAdmin-Pro-SQL 1.7.0
- Ubuntu 12.04 LTS
- Web server Apache
====

Hello there,

I have added a domain for a client, let us call it domain.tld. I have added some users. My client downloads all the new mails to his exchange server using a pop connector. The mails get downloaded and distributed on his Exchange Server perfectly.

Now for sending emails:
Since his pop connector can only configure one account for sending out emails, i have created a account called smtpsend@domain.tld. So the pop connector can use this account to send out all the emails form all the accounts from domain.tld.

tying this i get the follwing error:
===
Server error: 553
Server replied: 553 5.7.1 <my_user@domain.tld>: Sender address rejected: not owned by user smtpsend@domain.tld
Server: 'my-server'
Windows Live Mail-Error: 0x800CCC79
Protocoll: SMTP
Port: 587
Secure (SSL): Yes
===

Is there a way to configure this in iredmail? Can i make smtpsend@domain.tld "own" all the accounts so the sending works?

Any help is very apreciated.

I believe this question was already asked but not anwered in the follwing thread:

http://www.iredmail.org/forum/topic5007 … erver.html

Kind regards Mike

----

Spider Email Archiver: On-Premises, lightweight email archiving software developed by iRedMail team. Supports Amazon S3 compatible storage and custom branding.

2

Re: Exchange Server - POP Connector - Error 553

reading this topic

http://www.iredmail.org/forum/topic342- … -user.html

seems to be related.

Kind regards Mike

3 (edited by mike_theknife 2016-07-19 02:31:49)

Re: Exchange Server - POP Connector - Error 553

I have replaced the follwing line in my /etc/postfix/main.cf

from
smtpd_sender_restrictions = permit_mynetworks, reject_sender_login_mismatch,  permit_sasl_authenticated
to
smtpd_sender_restrictions = permit_mynetworks, permit_sasl_authenticated

Lets see if the problem is solved.

I wonder if it is a security issue, can now send any authenticated user on the system send emails in the name of any users on my server. So a autheticated user test@domaina.com can send mails as someonelse@domainb.com.

Maybe I can leave the "reject_sender_login_mismatch" and adjust the smtpd_sender_login_maps = proxy:mysql:/etc/postfix/mysql/sender_login_maps.cf somehow to achieve my goal.

http://www.postfix.org/postconf.5.html# … login_maps

4

Re: Exchange Server - POP Connector - Error 553

If you're running the latest iRedAPD, please add one line in /opt/iredapd/settings.py, and restart iredapd service:

ALLOWED_LOGIN_MISMATCH_SENDERS = ['smtpsend@domain.tld']

Also, please show us output of commands below:

postconf -n
grep '^plugins' /opt/iredapd/settings.py

5

Re: Exchange Server - POP Connector - Error 553

Thank you for your reply

postconf -n (anonymized)
alias_database = hash:/etc/postfix/aliases
alias_maps = hash:/etc/postfix/aliases
allow_min_user = no
allow_percent_hack = no
append_dot_mydomain = no
biff = no
bounce_queue_lifetime = 4h
broken_sasl_auth_clients = yes
config_directory = /etc/postfix
content_filter = smtp-amavis:[127.0.0.1]:10024
delay_warning_time = 0h
disable_vrfy_command = yes
dovecot_destination_recipient_limit = 1
enable_original_recipient = no
home_mailbox = Maildir/
inet_interfaces = all
inet_protocols = ipv4
lmtp_tls_mandatory_protocols = !SSLv2 !SSLv3
lmtp_tls_protocols = !SSLv2 !SSLv3
mailbox_command = /usr/lib/dovecot/deliver
mailbox_size_limit = 0
maximal_backoff_time = 4000s
maximal_queue_lifetime = 4h
message_size_limit = 15728640
minimal_backoff_time = 300s
mydestination = $myhostname, localhost, localhost.localdomain, localhost.$myhostname
mydomain = com.acme
myhostname = mail.acme.com
mynetworks = 127.0.0.0/8
mynetworks_style = subnet
myorigin = mail.acme.com
proxy_read_maps = $canonical_maps $lmtp_generic_maps $local_recipient_maps $mydestination $mynetworks $recipient_bcc_maps $recipient_canonical_maps $relay_domains $relay_recipient_maps $relocated_maps $sender_bcc_maps $sender_canonical_maps $smtp_generic_maps $smtpd_sender_login_maps $transport_maps $virtual_alias_domains $virtual_alias_maps $virtual_mailbox_domains $virtual_mailbox_maps $smtpd_sender_restrictions
queue_run_delay = 300s
readme_directory = no
recipient_bcc_maps = proxy:mysql:/etc/postfix/mysql/recipient_bcc_maps_user.cf, proxy:mysql:/etc/postfix/mysql/recipient_bcc_maps_domain.cf
recipient_delimiter = +
relay_domains = $mydestination, proxy:mysql:/etc/postfix/mysql/relay_domains.cf
relayhost = 123.123.123.123
sender_bcc_maps = proxy:mysql:/etc/postfix/mysql/sender_bcc_maps_user.cf, proxy:mysql:/etc/postfix/mysql/sender_bcc_maps_domain.cf
smtp-amavis_destination_recipient_limit = 1
smtp_data_init_timeout = 240s
smtp_data_xfer_timeout = 600s
smtp_tls_mandatory_protocols = !SSLv2 !SSLv3
smtp_tls_protocols = !SSLv2 !SSLv3
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu)
smtpd_data_restrictions = reject_unauth_pipelining
smtpd_end_of_data_restrictions = check_policy_service inet:127.0.0.1:10031
smtpd_helo_required = yes
smtpd_helo_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_non_fqdn_helo_hostname, reject_invalid_helo_hostname, check_helo_access pcre:/etc/postfix/helo_access.pcre
smtpd_recipient_restrictions = reject_unknown_sender_domain, reject_unknown_recipient_domain, reject_non_fqdn_sender, reject_non_fqdn_recipient, reject_unlisted_recipient, check_policy_service inet:127.0.0.1:7777, check_policy_service inet:127.0.0.1:10031, permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination
smtpd_reject_unlisted_recipient = yes
smtpd_reject_unlisted_sender = yes
smtpd_sasl_auth_enable = yes
smtpd_sasl_authenticated_header = no
smtpd_sasl_local_domain =
smtpd_sasl_path = ./dovecot-auth
smtpd_sasl_security_options = noanonymous
smtpd_sasl_type = dovecot
smtpd_sender_login_maps = proxy:mysql:/etc/postfix/mysql/sender_login_maps.cf
smtpd_sender_restrictions = permit_mynetworks, permit_sasl_authenticated
smtpd_tls_CAfile = /etc/ssl/certs/acme.crt
smtpd_tls_cert_file = /etc/ssl/certs/acme.crt
smtpd_tls_key_file = /etc/ssl/private/acme.key
smtpd_tls_loglevel = 0
smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3
smtpd_tls_protocols = !SSLv2 !SSLv3
smtpd_tls_security_level = may
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
smtpd_use_tls = yes
swap_bangpath = no
tls_random_source = dev:/dev/urandom
transport_maps = proxy:mysql:/etc/postfix/mysql/transport_maps_user.cf, proxy:mysql:/etc/postfix/mysql/transport_maps_domain.cf
virtual_alias_domains =
virtual_alias_maps = proxy:mysql:/etc/postfix/mysql/virtual_alias_maps.cf, proxy:mysql:/etc/postfix/mysql/domain_alias_maps.cf, proxy:mysql:/etc/postfix/mysql/catchall_maps.cf, proxy:mysql:/etc/postfix/mysql/domain_alias_catchall_maps.cf
virtual_gid_maps = static:2000
virtual_mailbox_base = /var/vmail
virtual_mailbox_domains = proxy:mysql:/etc/postfix/mysql/virtual_mailbox_domains.cf
virtual_mailbox_maps = proxy:mysql:/etc/postfix/mysql/virtual_mailbox_maps.cf
virtual_minimum_uid = 2000
virtual_transport = dovecot
virtual_uid_maps = static:2000


grep '^plugins' /opt/iredapd/settings.py
plugins = ["sql_alias_access_policy", "sql_user_restrictions"]

6

Re: Exchange Server - POP Connector - Error 553

OK, here's the suggestion:

*) Remove 'reject_sender_login_mismatch' from Postfix 'smtpd_sender_restrictions ='.
*) Upgrade iRedAPD to the latest 1.9.1 by following our tutorial: http://www.iredmail.org/docs/upgrade.iredapd.html
*) Enable iRedAPD plugin 'reject_sender_login_mismatch' in /opt/iredapd/settings.py.
*) Add one line in /opt/iredapd/settings.py, and restart iredapd service:

ALLOWED_LOGIN_MISMATCH_SENDERS = ['smtpsend@domain.tld']

Simply removing 'reject_sender_login_mismatch' in Postfix is not ideal, because you still need to reject spams which sends email as your hosted user. That's why iRedAPD plugin 'reject_sender_login_mismatch' can help.

Also, i expect you can reply sooner (at least not reply in 2 weeks), so that i don't need to re-check all posts in this thread to understand what we're trying to solve.