Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Postfix - antispam and relay package

    Scheduled Pinned Locked Moved pfSense Packages
    855 Posts 136 Posters 1.2m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      boogaard
      last edited by

      Hello team, I need help with the pfsense postfix forwader antispam tool postscreen.
      I have to disable those after greeting Tests - greylisting Problem with Office365 Mails:
      postscreen_bare_newline_enable  no
      postscreen_non_smtp_command_enable  no
      postscreen_pipelining_enable  no
      How can I manage this ?
      Kind Regards,
      Hanno

      1 Reply Last reply Reply Quote 0
      • N
        n3by
        last edited by

        For permanent changes you can edit file: postfix.inc

        there you have the file with changes I made for my config;
        It include a warning notice for the lines you want to disable, that settings will delay receiving emails but you can disable from antispam config, no need to delete it.

        /*
        	postfix.inc
        	part of pfSense (https://www.pfSense.org/)
        	Copyright (C) 2010 Erik Fonnesbeck
        	Copyright (C) 2011-2016 Marcello Coutinho
        	Copyright (C) 2015 ESF, LLC
        	All rights reserved.
        
        	Redistribution and use in source and binary forms, with or without
        	modification, are permitted provided that the following conditions are met:
        
        	1\. Redistributions of source code must retain the above copyright notice,
        	   this list of conditions and the following disclaimer.
        
        	2\. Redistributions in binary form must reproduce the above copyright
        	   notice, this list of conditions and the following disclaimer in the
        	   documentation and/or other materials provided with the distribution.
        
        	THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
        	INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
        	AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
        	AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
        	OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
        	SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
        	INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
        	CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
        	ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
        	POSSIBILITY OF SUCH DAMAGE.
        */
        $shortcut_section = "postfix";
        require_once("config.inc");
        require_once("functions.inc");
        require_once("globals.inc");
        require_once("interfaces.inc");
        require_once("notices.inc");
        require_once("pkg-utils.inc");
        require_once("services.inc");
        require_once("util.inc");
        require_once("xmlrpc.inc");
        require_once("xmlrpc_client.inc");
        
        define('POSTFIX_LOCALBASE','/usr/local');
        
        $uname=posix_uname();
        if ($uname['machine'] == 'amd64') {
        	ini_set('memory_limit', '250M');
        }
        
        function px_text_area_decode($text) {
        	return preg_replace('/\r\n/', "\n",base64_decode($text));
        }
        
        function px_get_real_interface_address($iface) {
        	global $config;
        	$iface = convert_friendly_interface_to_real_interface_name($iface);
        	$line = trim(shell_exec("ifconfig $iface | grep inet | grep -v inet6"));
        	$postfix_enabled = $config['installedpackages']['postfix']['config'][0]['enable_postfix'];
        	list($dummy, $ip, $dummy2, $netmask) = explode(" ", $line);
        	return array($ip, long2ip(hexdec($netmask)));
        }
        
        function sync_relay_recipients($via_cron = "cron") {
        	global $config,$g;
        	// relay recipients
        	if ($config['installedpackages']['postfixrecipients']['config']) {
        		$relay_recipients = "";
        		$relay_ldap_recipients = "";
        		$ad_export = "/usr/local/bin/adexport.pl";
        		$postfix_enabled = $config['installedpackages']['postfix']['config'][0]['enable_postfix'];
        		if (is_array($config['installedpackages']['postfixrecipients']['config'])) {
        			$relay_ldap_recipients = "";
        			$postfix_recipients_config=$config['installedpackages']['postfixrecipients']['config'][0];
        			 if ($postfix_recipients_config['enable_url'] && is_URL($postfix_recipients_config['custom_url'])) {
        				print "extracting from ".$postfix_recipients_config['custom_url']."...";
        				$relay_recipients .= file_get_contents($postfix_recipients_config['custom_url']);
        				print "(". count(file($postfix_recipients_config['custom_url'])).")\n";
        			}
        			if ($postfix_recipients_config['custom_recipients']) {
        				$relay_recipients .= px_text_area_decode($postfix_recipients_config['custom_recipients']);
        			}
        			if ($postfix_recipients_config['enable_ldap']) {
        				// validate cront job
        				if ($via_cron == "gui") {
        					// running via pfsense gui, not time for ldap fetch.
        					$ldap_recipients = POSTFIX_LOCALBASE. '/etc/postfix/relay_ldap_recipients.txt';
        					if (!file_exists($ldap_recipients)) {
        						system('/usr/bin/touch '. $ldap_recipients);
        					}
        					$relay_ldap_recipients = file_get_contents($ldap_recipients);
        				} else {
        					// running via crontab, time to get ldap content.
        					$ldap_temp = array();
        					foreach ($postfix_recipients_config['row'] as $postfix_ldap) {
        						print "extracting from ".$postfix_ldap['dc']."...";
        						$filename = POSTFIX_LOCALBASE."/etc/postfix/relay_ldap_recipients.".$postfix_ldap['dc'].".txt";
        						exec($ad_export." ".$postfix_ldap['dc']." ".$postfix_ldap['cn']." ".$postfix_ldap['username']." ".$postfix_ldap['password'],$ldap_fetch,$status);
        						if ($status == 0) {
        							// write backup conf for ldap server
        							$fp = fopen($filename,"w+");
        							foreach($ldap_fetch as $key => $value) {
        								fwrite($fp,$value."\n");
        							}
        							fclose($fp);
        						} else {
        							if (file_exists($filename)) {
        								// LDAP fetch failed...read backup file.
        								print "Restoring backup file for ".$postfix_ldap['dc']."...";
        								$ldap_fetch=file($filename);
        							} else {
        								// we never got any info from this server.
        								print "There is no backup file for ".$postfix_ldap['dc']."...";
        								$ldap_fetch=array();
        							}
        						}
        						$ldap_all = array_merge($ldap_temp,$ldap_fetch);
        						$ldap_temp = $ldap_all;
        						print "(" . count($ldap_fetch) . ")\n";
        						$ldap_fetch = array();
        					}
        					$ldap_unique = array_unique($ldap_all);
        					print "Total ldap recipients:" . count($ldap_all) . "\tunique:" . count($ldap_unique) . "\n";
        					foreach ($ldap_unique as $recipient) {
        						$relay_ldap_recipients .= ($recipient != "" ? preg_replace("/\s+/","",$recipient) . " OK\n" : "");
        					}
        
        					// save ldap relay recipients
        					file_put_contents(POSTFIX_LOCALBASE."/etc/postfix/relay_ldap_recipients.txt",$relay_ldap_recipients, LOCK_EX);
        				}
        			}
        		}
        		// save all relay recipients, remove duplicates and reload postfix
        		$recipients_file = POSTFIX_LOCALBASE."/etc/postfix/relay_recipients";
        		file_put_contents ($recipients_file . ".unsort",$relay_ldap_recipients . "\n" . $relay_recipients, LOCK_EX);
        		exec ('/usr/bin/sort -u '.$recipients_file.'.unsort > '.$recipients_file);
        		unlink_if_exists ($recipients_file.'.unsort');
        		exec (POSTFIX_LOCALBASE."/sbin/postmap ".POSTFIX_LOCALBASE."/etc/postfix/relay_recipients");
        		mwexec ("/usr/local/sbin/postfix reload");
        	}
        	if ($relay_recipients != "" || $relay_ldap_recipients!= "") {
        		return ("relay_recipient_maps = hash:".POSTFIX_LOCALBASE."/etc/postfix/relay_recipients\n");
        	}
        
        }
        function check_cron() {
        	global $config, $g;
        
        	$cron_postfix_sqlite = "";
        	$cron_cmd_sqlite = "/usr/local/bin/php -q /usr/local/www/postfix.php";
        	$cron_cmd_recipients = "/usr/local/bin/php -q /usr/local/www/postfix_recipients.php";
        	if (is_array($config['installedpackages']['postfix']['config'])) {
        		$postfix_enabled = $config['installedpackages']['postfix']['config'][0]['enable_postfix'];
        	}
        
        	// check ldap update
        	if (is_array($config['installedpackages']['postfixrecipients']['config'])) {
        		$postfix_recipients_config = $config['installedpackages']['postfixrecipients']['config'][0];
        	}
        	// check crontab relay recipients
        	if (preg_match("/(\d+)(\w)/", $postfix_recipients_config['freq'], $matches)) {
        		$r_minute = "*";
        		$r_hour = "*";
        		$r_mday = "*";
        		$r_month = "*";
        		$r_wday = "*";
        		$r_who = "root";
        		switch ($matches[2]) {
        			case m:
        				$r_minute = "*/" . $matches[1];
        				break;
        			case h:
        				$r_minute = "0";
        				$r_hour = "*/" . $matches[1];
        				break;
        			case d:
        				$r_minute = "0";
        				$r_hour = "0";
        				$r_mday = "*/" . $matches[1];
        				break;
        			default:
        				$input_errors[] = "A valid number with a time reference is required for the field 'Frequency'";
        		}
        	}
        
        	// check crontab Sqlite databases
        	if (is_array($config['installedpackages']['postfix']['config'])) {
        		$cron_sqlite_queue = $config['installedpackages']['postfix']['config'][0]['update_sqlite'];
        		if ($cron_sqlite_queue != "" && $cron_sqlite_queue != "never") {
        			$s_minute = "*";
        			$s_hour = "*";
        			$s_mday = "*";
        			$s_month = "*";
        			$s_wday = "*";
        			$s_who = "root";
        			switch ($cron_sqlite_queue) {
        				case '01min':
        					$cron_postfix_sqlite = $cron_cmd_sqlite . " 01min";
        					break;
        				case '10min':
        					$s_minute = "*/10";
        					$cron_postfix_sqlite = $cron_cmd_sqlite . " 10min";
        					break;
        				case '01hour':
        					$s_minute = "0";
        					$cron_postfix_sqlite = $cron_cmd_sqlite . " 01hour";
        					break;
        				case '24hours':
        					$s_minute = "0";
        					$s_hour = "0";
        					$cron_postfix_sqlite = $cron_cmd_sqlite . " 24hours";
        					break;
        			}
        		}
        	}
        
        	// update cron
        	if ($postfix_enabled == "on") {
        		if ($postfix_recipients_config['enable_ldap'] || $postfix_recipients_config['enable_url']) {
        			install_cron_job ("{$cron_cmd_recipients}", true, $r_minute, $r_hour, $r_mday, $r_month, $r_wday, $r_who);
        		} else {
        			install_cron_job ("{$cron_cmd_recipients}", false);
        		}
        		if ($cron_sqlite_queue != "" && $cron_sqlite_queue != "never") {
        			// First remove the previous schedule since the command was appended as well
        			install_cron_job ("{$cron_cmd_sqlite}", false);
        			install_cron_job ("{$cron_postfix_sqlite}", true, $s_minute, $s_hour, $s_mday, $s_month, $s_wday, $s_who);
        		} else {
        			install_cron_job ("{$cron_cmd_sqlite}", false);
        		}
        	} else {
        		install_cron_job ("{$cron_cmd_recipients}", false);
        		install_cron_job("{$cron_cmd_sqlite}", false);
        	}
        }
        
        function sync_package_postfix($via_rpc = "no") {
        	global $g, $config;
        
        	log_error("sync_package_postfix called with via_rpc={$via_rpc}");
        	# detect boot process
        	if (is_array($_POST)) {
        		if (function_exists("platform_booting")) {
        			if (!platform_booting()) {
        				unset($boot_process);
        			} else {
        				$boot_process = "on";
        			}
        		} elseif (!($g['booting'])) {
        			unset($boot_process);
        		} else {
        			$boot_process = "on";
        		}
        	}
        
        	if (is_process_running("master") && isset($boot_process) && $via_rpc == "no") {
        		return;
        	}
        
        	// check patch in /etc/inc/config.
        	$relay_domains = "";
        	$transport = "";
        	$postfix_config=$config['installedpackages']['postfix']['config'][0];
        	if (is_array($config['installedpackages']['postfixdomains'])) {
        		$postfix_domains=$config['installedpackages']['postfixdomains']['config'][0];
        	}
        	$message_size_limit = ($postfix_config['message_size_limit'] ? $postfix_config['message_size_limit'] : "10240000");
        	$process_limit = ($postfix_config['process_limit'] ? $postfix_config['process_limit'] : "100");
        	if (is_array($postfix_domains['row'])) {
        		foreach ($postfix_domains['row'] as $postfix_row) {
        			$relay_domains .= ' ' . $postfix_row['domain'];
        			if (!empty($postfix_row['mailserverip'])) {
        				$transport .= $postfix_row['domain'] . " smtp:[" . $postfix_row['mailserverip'] . "]\n";
        			}
        		}
        	}
        
        	// check cron
        	check_cron();
        
        	#check_debug
        	if ($postfix_config['debug_list'] && $postfix_config['debug_list'] != "") {
        	$check_debug  = "\n#Debugging postfix\n";
        	$check_debug .= "debug_peer_list = ".px_text_area_decode($postfix_config['debug_list'])."\n";
        	$check_debug .= "debug_peer_level = ".$postfix_config['debug_level']."\n\n";
        	}
        	#check relay recipients
        	$all_relay_recipients = sync_relay_recipients('gui');
        
        	$copyright = <<<about<br>#Part of the Postfix package for pfSense
        #Copyright (C) 2010 Erik Fonnesbeck
        #Copyright (C) 2011-2016 Marcello Coutinho
        #All rights reserved.
        #DO NOT EDIT THIS FILE
        
        ABOUT;
        $pf_dir=POSTFIX_LOCALBASE;
        	$postfix_main=<<<eof<br>#Permanent changes edit /usr/local/pkg/postfix.inc
        #main.cf\
        {$copyright}
        mynetworks = {$pf_dir}/etc/postfix/mynetwork_table
        mynetworks_style = host
        access_map_reject_code= 554
        access_map_defer_code = 451
        unverified_recipient_reject_code = 550
        unknown_client_reject_code = 550
        unknown_hostname_reject_code = 550
        
        EOF;
        	// Header Maps
        	$mynetworks = "";
        	if ($config['installedpackages']['postfixacl']['config'][0]['mynetworks']) {
        		$mynetworks = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['mynetworks']);
        	}
        
        	// Header Maps
        	if ($config['installedpackages']['postfixacl']['config'][0]['header_maps']) {
        		$postfix_main .= "header_checks = pcre:".POSTFIX_LOCALBASE."/etc/postfix/header_check\n";
        		$postfix_main .= "header_size_limit = 1024000\n";
        		$header_check = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['header_maps']);
        	}
        
        	// Helo Maps
        	if ($config['installedpackages']['postfixacl']['config'][0]['helo_maps']) {
        		$helo_check = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['helo_maps']);
        	}
        
        	// Sender access
        	if ($config['installedpackages']['postfixacl']['config'][0]['sender_access']) {
        		$sender_access = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['sender_access']);
        	}
        
        	// MIME Maps
        	if ($config['installedpackages']['postfixacl']['config'][0]['mime_maps']) {
        		$postfix_main .= "mime_header_checks = pcre:".POSTFIX_LOCALBASE."/etc/postfix/mime_check\n";
        		$mime_check = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['mime_maps']);
        	}
        
        	// Body Maps
        	if ($config['installedpackages']['postfixacl']['config'][0]['body_maps']) {
        		$postfix_main .= "body_checks = pcre:".POSTFIX_LOCALBASE."/etc/postfix/body_check\n";
        		$body_check = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['body_maps']);
        	}
        
        	// Client CIDR
        	if ($config['installedpackages']['postfixacl']['config'][0]['cal_cidr']) {
        		if ($antispam['zombie_blocker']=='disabled') {
        			$cal_cidr = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['cal_cidr']);
        		} else {
        			//format file without 'oks'
        			$cal_cidr_tmp = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['cal_cidr']);
        			$cal_cidr = preg_replace('/ ok/i'," permit",$cal_cidr_tmp);
        		}
        	}
        
        	// Client PCRE
        	if ($config['installedpackages']['postfixacl']['config'][0]['cal_pcre']) {
        		$cal_pcre = px_text_area_decode($config['installedpackages']['postfixacl']['config'][0]['cal_pcre']);
        	}
        	$postfix_main .= px_text_area_decode($postfix_config['maincf'])."\n".
        		"relay_domains ={$relay_domains}\n" .
        		"transport_maps = hash:".POSTFIX_LOCALBASE."/etc/postfix/transport\n" .
        		"local_recipient_maps =\n" .
        		$all_relay_recipients.
        		"mydestination =\n" .
        		"mynetworks_style = host\n" .
        		"message_size_limit = {$message_size_limit}\n" .
        		"default_process_limit = {$process_limit}\n";
        
        	//assign antispam options
        	$antispam = $config['installedpackages']['postfixantispam']['config'][0];
        
        	if ($antispam['antispam_enabled']) {
        		switch ($antispam['antispam_software']) {
        			case "mailscanner":
        			if ($antispam['hold_mode'] == 'auto') {
        				$header_check .= "\n/^Received:/ HOLD\n";
        				$postfix_main_antispam = "#Saving all mail after header/body/rbl/spf checks to mailscanner\n\n";
        				}
        			break;
        			case "policyd2":
        			if ($antispam['antispam_location']) {
        				$postfix_main_antispam = <<<eof<br>#using policyd v2
        client_throttle = check_policy_service {$antispam['antispam_location']}
        smtpd_client_restrictions = check_policy_service {$antispam['antispam_location']}
        smtpd_restriction_classes =
        		has_our_domain_as_sender
        		client_throttle
        smtpd_end_of_data_restrictions = check_policy_service {$antispam['antispam_location']}
        
        EOF;
        			} else {
        				$postfix_main_antispam = "Policyd v2 has no location set.\n\n";
        			}
        			break;
        		}
        	}
        	if ($antispam['reject_unknown_helo_hostname']) {
        		$reject_unknown_helo_hostname = <<<eof<br>smtpd_helo_restrictions = check_helo_access pcre:{$pf_dir}/etc/postfix/helo_check,
        				reject_unknown_helo_hostname,
        				reject_invalid_helo_hostname,
        				reject_non_fqdn_helo_hostname,
        				permit
        
        EOF;
        	}
        	if ($antispam['header_check'] == "strong") {
        		$postfix_main .= <<<eof<br>disable_vrfy_command = yes
        strict_rfc821_envelopes = no
        
        #Just reject after helo,sender,client,recipient tests default enabled yes
        smtpd_delay_reject = yes
        
        # Don't talk to mail systems that don't know their own hostname.
        smtpd_helo_required = yes
        {$reject_unknown_helo_hostname}
        
        smtpd_sender_restrictions = reject_non_fqdn_sender,
        				reject_unknown_sender_domain,
        				reject_unauth_pipelining,
        				reject_multi_recipient_bounce,
        				permit
        
        # Allow connections from specified local clients and strong check everybody else.
        smtpd_client_restrictions = permit_mynetworks,
        				reject_unauth_destination,
        				check_client_access pcre:{$pf_dir}/etc/postfix/cal_pcre,
        				check_client_access cidr:{$pf_dir}/etc/postfix/cal_cidr,
        				reject_unknown_client_hostname,
        				reject_unauth_pipelining,
        				reject_multi_recipient_bounce,
        				permit
        
        smtpd_recipient_restrictions = permit_mynetworks,
        				reject_unauth_destination,
        				reject_unauth_pipelining,
        				check_client_access pcre:{$pf_dir}/etc/postfix/cal_pcre,
        				check_client_access cidr:{$pf_dir}/etc/postfix/cal_cidr,
        				check_sender_access hash:{$pf_dir}/etc/postfix/sender_access,
        				reject_non_fqdn_helo_hostname,
        				reject_unknown_recipient_domain,
        				reject_non_fqdn_recipient,
        				reject_multi_recipient_bounce,
        #				reject_unverified_recipient,
        				SPFSPFSPFRBLRBLRBL
        
        EOF;
        	} else {
        		$postfix_main .= <<<eof<br>#Just reject after helo,sender,client,recipient tests
        smtpd_delay_reject = yes
        
        # Don't talk to mail systems that don't know their own hostname.
        smtpd_helo_required = yes
        {$reject_unknown_helo_hostname}
        
        smtpd_sender_restrictions = reject_unknown_sender_domain,
        				RBLRBLRBL
        
        # Allow connections from specified local clients and rbl check everybody else if rbl check are set.
        smtpd_client_restrictions = permit_mynetworks,
        				reject_unauth_destination,
        				check_sender_access hash:{$pf_dir}/etc/postfix/sender_access,
        				check_client_access pcre:{$pf_dir}/etc/postfix/cal_pcre,
        				check_client_access cidr:{$pf_dir}/etc/postfix/cal_cidr
        				RBLRBLRBL
        
        # Whitelisting: local clients may specify any destination domain.
        #,
        smtpd_recipient_restrictions = permit_mynetworks,
        				reject_unauth_destination,
        				check_sender_access hash:{$pf_dir}/etc/postfix/sender_access,
        				check_client_access pcre:{$pf_dir}/etc/postfix/cal_pcre,
        				check_client_access cidr:{$pf_dir}/etc/postfix/cal_cidr,
        				SPFSPFSPFRBLRBLRBL
        
        EOF;
        	}
        #check spf option
        	switch ($antispam['postfix_spf']) {
        		case 'spf_mark_only':
        			$postfix_main.= "spf_mark_only = yes\n";
        			$spf = "reject_spf_invalid_sender,\n\t\t\t\t";
        			break;
        		case 'disable':
        			$spf = "";
        			break;
        		default:
        #			$spf=$antispam['postfix_spf'].",\n\t\t\t\t";
        			$spf = "";
        			break;
        	}
        	$postfix_main  = preg_replace("/SPFSPFSPF/",$spf,$postfix_main);
        	$postfix_main .= $postfix_main_antispam.$check_debug;
        	switch ($antispam['zombie_blocker']) {
        		case "enforce":
        		case "drop":
        		case "ignore":
        			$postscreen = 1;
        			break;
        		case "disabled":
        			$postscreen = 0;
        			break;
        	}
        	if ($antispam['soft_bounce'] == "enabled") {
        		$postfix_main .= "soft_bounce = yes\n";
        	}
        
        	//check ips to listen on
        	$inet_protocols = ($postfix_config['inet_protocol'] ? $postfix_config['inet_protocol'] : "ipv4");
        	$inet_interfaces = array();
        	if (preg_match("/All/",$postfix_config['enabled_interface'])) {
        		$inet_interfaces[] = "";
        	} elseif ($postfix_config['enabled_interface'] == "lo0") {
        		$inet_interfaces[] = "loopback-only";
        	} else {
        		$ifaces = ($postfix_config['enabled_interface'] ? $postfix_config['enabled_interface'] : 'wan');
        		foreach (explode(',',$ifaces) as $listenon) {
        			if (is_ipaddrv6($listenon) && preg_match("/(ipv6|all)/i",$inet_protocols)) {
        				$inet_interfaces[]= "{$listenon}";
        			} elseif (is_ipaddr($listenon) && preg_match("/(ipv4|all)/i",$inet_protocols)) {
        				$inet_interfaces[]= "{$listenon}";
        			} else {
        				$listenon=(pfSense_get_interface_addresses(convert_friendly_interface_to_real_interface_name($listenon)));
        				if (is_ipaddr($listenon['ipaddr']) && preg_match("/(ipv4|all)/i",$inet_protocols)) {
        					$inet_interfaces []= "{$listenon['ipaddr']}";
        				}
        				if (is_ipaddrv6($listenon['ipaddr6']) && preg_match("/(ipv6|all)/i",$inet_protocols)) {
        					$inet_interfaces []= "{$listenon['ipaddr6']}";
        				}
        			}
        		}
        	}
        	$postfix_main .= "inet_protocols = {$inet_protocols}\n";
        	$postfix_main .= "inet_interfaces = ".implode(",",$inet_interfaces)."\n";
        
        	if ($postscreen==1)	#Postscreen enabled
        	{
        	if(preg_match("/(\d+),(\d+)(s|m|h|w)/",$antispam['greet_time'],$greet)){
        			$postfix_main.='postscreen_greet_wait = ${stress?'.$greet[1].'}${stress:'.$greet[2].'}'.$greet[3]."\n";
        			}
        		$ag=$antispam['after_greeting'];
        		if(preg_match("/postscreen_disable_vrfy_command/",$antispam['after_greeting'])){
        			$postfix_main.="postscreen_disable_vrfy_command = yes\n";
        			}
        		if(preg_match("/postscreen_non_smtp_command_enable/",$antispam['after_greeting'])){
        			$postfix_main.="#Any one of this setting will delay mail !\n";
        			$postfix_main.="postscreen_non_smtp_command_enable = yes\n";
        			$postfix_main.="postscreen_non_smtp_command_action = ".$antispam['zombie_blocker']."\n";
        			$postfix_main.="#-----------------------------------------\n";
        			}
        		if(preg_match("/postscreen_pipelining_enable/",$antispam['after_greeting'])){
        			$postfix_main.="#Any one of this setting will delay mail !\n";
        			$postfix_main.="postscreen_pipelining_enable = yes\n";
        			$postfix_main.="postscreen_pipelining_action = ".$antispam['zombie_blocker']."\n";
        			$postfix_main.="#-----------------------------------------\n";
        			}
        		if(preg_match("/postscreen_bare_newline_enable/",$antispam['after_greeting'])){
        			$postfix_main.="#Any one of this setting will delay mail !\n";
        			$postfix_main.="postscreen_bare_newline_enable = yes\n";
        			$postfix_main.="postscreen_bare_newline_action = ".$antispam['zombie_blocker']."\n";
        			$postfix_main.="#-----------------------------------------\n";
        			}
        		if(preg_match("/postscreen_greet_check/",$antispam['after_greeting'])){
        			$postfix_main.="postscreen_greet_action = ".$antispam['zombie_blocker']."\n";
        			}
        
        		$postfix_main .= "postscreen_access_list = permit_mynetworks,\n\t\t\tcidr:".POSTFIX_LOCALBASE."/etc/postfix/cal_cidr\n";
        		$postfix_main .= "postscreen_dnsbl_action= ".$antispam['zombie_blocker']."\n";
        		$postfix_main .= "postscreen_blacklist_action= ".$antispam['zombie_blocker']."\n";
        
        		//postscreen interface loop
        		//$ifaces = ($postfix_config['enabled_interface'] ? $postfix_config['enabled_interface'] : 'wan');
        		//$real_ifaces = array();
        		//$postfix_master="";
        		//foreach (explode(",", $ifaces) as $i => $iface) {
        		//	$real_ifaces[] = px_get_real_interface_address($iface);
        		//	if ($real_ifaces[$i][0]) {
        		//		$postfix_master .=$real_ifaces[$i][0].":25	inet  n       -       n       -       1       postscreen\n\t-o user=postfix\n";
        		$postfix_master  = "smtp	inet  n       -       n       -       1       postscreen\n";
        		$postfix_master .= ($antispam['soft_bounce'] == "postscreen" ? "\t-o soft_bounce=yes\n" : "");
        		//	}
        		//}
        		$postfix_master .= $postfix_inets.<<<mastereof<br>smtpd     pass  -       -       n       -       -       smtpd
        dnsblog   unix  -       -       n       -       0       dnsblog
        tlsproxy  unix  -       -       n       -       0       tlsproxy
        
        MASTEREOF;
        		$rbl2 = "";
        		if ($antispam['rbl_servers'] != "") {
        			$postfix_main .= "postscreen_dnsbl_sites = " . $antispam['rbl_servers']."\n";
        			$postfix_main .= "postscreen_dnsbl_threshold = " . $antispam['rbl_threshold']."\n";
        		}
        	} else { //Postscreen disabled
        		if ($antispam['rbl_servers'] != "") {
        			$RBL = explode(",",$antispam['rbl_servers']);
        			foreach ($RBL as $rbl) {
        				$prefix = ($rbl2 != "" ? "\t\t\t\t" : "");
        				$rbl2 .= $prefix."reject_rbl_client $rbl,\n";
        			}
        		}
        
        		// interface loop
        		/*$postfix_inets="";
        		$ifaces = ($postfix_config['enabled_interface'] ? $postfix_config['enabled_interface'] : 'loopback');
        		$real_ifaces = array();
        		$postfix_master="";
        		foreach (explode(",", $ifaces) as $i => $iface) {
        			$real_ifaces[] = px_get_real_interface_address($iface);
        			if ($real_ifaces[$i][0]) {
        				$postfix_master .=$real_ifaces[$i][0].":25	inet  n       -       n       -       -       smtpd\n";
        			}
        		}
        		*/
        		$postfix_master = "25	inet  n       -       n       -       -       smtpd\n";
        	}
        	$rbl2 .= ($rbl2 != "" ? "\t\t\t\tpermit\n" : "permit\n");
        	$postfix_main = preg_replace("/RBLRBLRBL/",$rbl2,$postfix_main);
        
        	// Header Maps
        	$anvil_config = $config['installedpackages']['postfixantispam']['config'][0]['anvil'];
        	if ($anvil_config =='enabled' || ($anvil_config =='postscreen' && $postscreen==1)) {
        		$anvil='anvil     unix  -       -       n       -       1       anvil';
        	}
        
        	$postfix_master .= <<<mastereof2<br>pickup    fifo  n       -       n       60      1       pickup
        cleanup   unix  n       -       n       -       0       cleanup
        qmgr      fifo  n       -       n       300     1       qmgr
        tlsmgr    unix  -       -       n       1000?   1       tlsmgr
        rewrite   unix  -       -       n       -       -       trivial-rewrite
        bounce    unix  -       -       n       -       0       bounce
        defer     unix  -       -       n       -       0       bounce
        trace     unix  -       -       n       -       0       bounce
        verify    unix  -       -       n       -       1       verify
        flush     unix  n       -       n       1000?   0       flush
        proxymap  unix  -       -       n       -       -       proxymap
        proxywrite unix -       -       n       -       1       proxymap
        smtp      unix  -       -       n       -       -       smtp
        relay     unix  -       -       n       -       -       smtp
        	-o smtp_fallback_relay=
        showq     unix  n       -       n       -       -       showq
        error     unix  -       -       n       -       -       error
        retry     unix  -       -       n       -       -       error
        discard   unix  -       -       n       -       -       discard
        local     unix  -       n       n       -       -       local
        virtual   unix  -       n       n       -       -       virtual
        lmtp      unix  -       -       n       -       -       lmtp
        scache    unix  -       -       n       -       1       scache
        {$anvil}
        
        MASTEREOF2;
        
        	conf_mount_rw();
        
        	log_error("Writing out configuration");
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/main.cf", $postfix_main, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/master.cf", $postfix_master, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/transport", $transport, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/sender_access", $sender_access, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/cal_cidr", $cal_cidr, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/cal_pcre", $cal_pcre, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/header_check", $header_check, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/helo_check", $helo_check, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/mime_check", $mime_check, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/body_check", $body_check, LOCK_EX);
        	file_put_contents(POSTFIX_LOCALBASE . "/etc/postfix/mynetwork_table", $mynetworks, LOCK_EX);
        	$FILES = array("transport","sender_access");
        	foreach ($FILES as $file) {
        		mwexec(POSTFIX_LOCALBASE."/sbin/postmap ".POSTFIX_LOCALBASE."/etc/postfix/".$file);
        	}
        
        	#check postix dirs
        	$dirs = array("/var/spool/postfix","/etc/mail","/var/db/postfix","/var/mail/postfix");
        	foreach ($dirs as $dir) {
        		if (!is_dir($dir) && !file_exists($dir)) {
        			mkdir($dir, 0755,TRUE);
        		}
        	}
        
        	#check postfix owners
        	$dirs=array("/var/db/postfix","/var/mail/postfix");
        	foreach ($dirs as $dir) {
        		chown($dir, 'postfix');
        		chgrp($dir, 'postfix');
        	}
        	if (!file_exists("/etc/mail/aliases")) {
        		touch("/etc/mail/aliases");
        	}
        	if (!file_exists("/etc/aliases")) {
        		@symlink("/etc/mail/aliases", "/etc/aliases");
        	}
        	exec("/usr/local/bin/newaliases");
        	postfix_start();
        
        	//Do not sync during boot
        	if (!isset($boot_process) || $via_rpc == "yes") {
        		postfix_sync_on_changes();
        	}
        
        }
        function postfix_start() {
        	global $config;
        	$pf_dir = POSTFIX_LOCALBASE;
        	$pf_start_cmd = "{$pf_dir}/sbin/postfix start";
        
        	$start = << <eof<br>sysctl kern.ipc.nmbclusters=65536
        	sysctl kern.ipc.somaxconn=16384
        	sysctl kern.maxfiles=131072
        	sysctl kern.maxfilesperproc=104856
        	sysctl kern.threads.max_threads_per_proc=4096
        	{$pf_start_cmd}
        
        EOF;
        	$stop = POSTFIX_LOCALBASE."/sbin/postfix stop\n";
        	log_error("Writing rc_file");
        	write_rcfile(array("file" => "postfix.sh", "start" => $start, "stop" => $stop));
        
        	sleep(1);
        	if (is_array($config['installedpackages']['postfix']) && $config['installedpackages']['postfix']['config'][0]['enable_postfix']) {
        		log_error("Reloading/starting postfix");
        		system('/bin/chmod +x /usr/local/etc/rc.d/postfix.sh');
        		mwexec_bg(POSTFIX_LOCALBASE."/sbin/postfix reload || /usr/local/etc/rc.d/postfix.sh start");
        		log_error("Postfix setup completed");
        	} else {
        		log_error("Stopping postfix");
        		mwexec("/usr/local/etc/rc.d/postfix.sh stop");
        		system('/bin/chmod -x /usr/local/etc/rc.d/postfix.sh');
        	}
        	conf_mount_ro();
        }
        
        function postfix_validate_input($post, &$input_errors) {
        	foreach ($post as $key => $value) {
        		if (empty($value)) {
        			continue;
        		}
        		if ($key == "greet_time" && !preg_match("/(\d+),(\d+)(s|m|h|w)/",$value)) {
        				$input_errors[] = "Wrong greet time sintax.";
        		}
        		if ($key == "message_size_limit" && !is_numeric($value)) {
        				$input_errors[] = "Message size limit must be numeric.";
        		}
        		if ($key == "process_limit" && !is_numeric($value)) {
        				$input_errors[] = "Process limit must be numeric.";
        		}
        		if ($key == "freq" && (!preg_match("/^\d+(h|m|d)$/",$value) || $value == 0)) {
        				$input_errors[] = "A valid number with a time reference is required for the field 'Frequency'";
        		}
        		if (substr($key, 0, 2) == "dc" && !is_hostname($value)) {
        				$input_errors[] = "{$value} is not a valid host name.";
        		}
        		if (substr($key, 0, 6) == "domain" && is_numeric(substr($key, 6))) {
        			if (!is_domain($value)) {
        				$input_errors[] = "{$value} is not a valid domain name.";
        			}
        		} else if (substr($key, 0, 12) == "mailserverip" && is_numeric(substr($key, 12))) {
        			if (empty($post['domain' . substr($key, 12)])) {
        				$input_errors[] = "Domain for {$value} cannot be blank.";
        			}
        			if (!is_ipaddr($value) && !is_hostname($value)) {
        				$input_errors[] = "{$value} is not a valid IP address or host name.";
        			}
        		}
        	}
        }
        
        function postfix_php_install_command() {
        	sync_package_postfix();
        }
        
        function postfix_php_deinstall_command() {
        	global $config;
        	#disable service
        	if (is_array($config['installedpackages']['postfix'])) {
        		$config['installedpackages']['postfix']['config'][0]['enable_postfix'] = "";
        	}
        	write_config();
        	sync_package_postfix();
        	conf_mount_rw();
        	unlink_if_exists("/usr/local/etc/rc.d/postfix.sh");
        	unlink_if_exists("/etc/aliases");
        	conf_mount_ro();
        }
        
        /* Uses XMLRPC to synchronize the changes to a remote node */
        function postfix_sync_on_changes() {
        	global $config, $g;
        	if (is_array($config['installedpackages']['postfixsync']['config'])) {
        		$postfix_sync = $config['installedpackages']['postfixsync']['config'][0];
        		$synctimeout = $postfix_sync['synctimeout'] ? : '250';
        		$synconchanges = $postfix_sync['synconchanges'];
        		switch ($synconchanges) {
        			case "manual":
        				if (is_array($postfix_sync['row'])) {
        					$rs = $postfix_sync['row'];
        				} else {
        					log_error("[postfix] XMLRPC sync is enabled but there are no hosts configured as replication targets.");
        					return;
        				}
        				break;
        			case "auto":
        				if (is_array($config['hasync'])) {
        					$system_carp = $config['hasync'];
        					$rs[0]['ipaddress'] = $system_carp['synchronizetoip'];
        					$rs[0]['username'] = $system_carp['username'];
        					$rs[0]['password'] = $system_carp['password'];
        					$rs[0]['sync_type'] = "xmlrpc";
        					$rs[0]['enabless'] = FALSE;
        
        					// XMLRPC sync is currently only supported over connections using the same protocol and port as this system
        					if ($config['system']['webgui']['protocol'] == "http") {
        						$rs[0]['syncprotocol'] = "http";
        						$rs[0]['syncport'] = $config['system']['webgui']['port'] ? : '80';
        					} else {
        						$rs[0]['syncprotocol'] = "https";
        						$rs[0]['syncport'] = $config['system']['webgui']['port'] ? : '443';
        					}
        					if (!is_ipaddr($system_carp['synchronizetoip'])) {
        						log_error("[postfix] XMLRPC CARP/HA sync is enabled but there are no system backup hosts configured as replication targets.");
        						return;
        					} else {
        						$rs[0]['enabless'] = TRUE;
        					}
        				} else {
        					log_error("[postfix] XMLRPC CARP/HA sync is enabled but there are no system backup hosts configured as replication targets.");
        					return;
        				}
        				break;
        			default:
        				return;
        				break;
        		}
        		if (is_array($rs)) {
        			log_error("[postfix] XMLRPC sync is starting.");
        			foreach($rs as $sh) {
        				if ($sh['enabless'] && $sh['sync_type'] == 'xmlrpc') {
        					$sync_to_ip = $sh['ipaddress'];
        					$port = $sh['syncport'];
        					$username = $sh['username'] ? : 'admin';
        					$password = $sh['password'];
        					$protocol = $sh['syncprotocol'];
        					$sync_type = $sh['sync_type'];
        
        					$error = '';
        					$valid = TRUE;
        
        					if ($password == "") {
        						$error = "Password parameter is empty. ";
        						$valid = FALSE;
        					}
        					if (!is_ipaddr($sync_to_ip) && !is_hostname($sync_to_ip) && !is_domain($sync_to_ip)) {
        						$error .= "Misconfigured Replication Target IP Address or Hostname. ";
        						$valid = FALSE;
        					}
        					if (!is_port($port)) {
        						$error .= "Misconfigured Replication Target Port. ";
        						$valid = FALSE;
        					}
        					if ($valid) {
        						postfix_do_xmlrpc_sync($sync_to_ip, $port, $protocol, $username, $password, $synctimeout);
        					} else {
        						log_error("[postfix] XMLRPC sync with '{$sync_to_ip}' aborted due to the following error(s): {$error}");
        					}
        				}
        			}
        			log_error("[postfix] XMLRPC sync completed.");
        		}
         	}
        }
        
        /* Do the actual XMLRPC sync */
        function postfix_do_xmlrpc_sync($sync_to_ip, $port, $protocol, $username, $password, $synctimeout) {
        	global $config, $g;
        
        	if ($username == "" || $password == "" || $sync_to_ip == "" || $port == "" || $protocol == "") {
        		log_error("[postfix] A required XMLRPC sync parameter (username, password, replication target, port or protocol) is empty ... aborting pkg sync");
        		return;
        	}
        
        	// Take care of IPv6 literal address
        	if (is_ipaddrv6($sync_to_ip)) {
        		$sync_to_ip = "[{$sync_to_ip}]";
        	}
        
        	$url = "{$protocol}://{$sync_to_ip}";
        
        	/* XML will hold the sections to sync. */
        	$xml = array();
        	$xml['postfix'] = $config['installedpackages']['postfix'];
        	$xml['postfixdomains'] = $config['installedpackages']['postfixdomains'];
        	$xml['postfixacl'] = $config['installedpackages']['postfixacl'];
        	$xml['postfixrecipients'] = $config['installedpackages']['postfixrecipients'];
        	$xml['postfixantispam'] = $config['installedpackages']['postfixantispam'];
        
        	/* Assemble XMLRPC payload. */
        	$params = array(XML_RPC_encode($password), XML_RPC_encode($xml));
        
        	/* Set a few variables needed for sync code */
        	log_error("[postfix] Beginning XMLRPC sync to {$url}:{$port}.");
        	$method = 'pfsense.merge_installedpackages_section_xmlrpc';
        	$msg = new XML_RPC_Message($method, $params);
        	$cli = new XML_RPC_Client('/xmlrpc.php', $url, $port);
        	$cli->setCredentials($username, $password);
        	if ($g['debug']) {
        		$cli->setDebug(1);
        	}
        	/* Send our XMLRPC message and timeout after defined sync timeout value */
        	$resp = $cli->send($msg, $synctimeout);
        	if (!$resp) {
        		$error = "A communications error occurred while attempting XMLRPC sync with {$url}:{$port}.";
        		log_error("[postfix] {$error}");
        		file_notice("sync_settings", $error, "Postfix Settings Sync", "");
        	} elseif ($resp->faultCode()) {
        		$cli->setDebug(1);
        		$resp = $cli->send($msg, $synctimeout);
        		$error = "An error code was received while attempting XMLRPC sync with {$url}:{$port} - Code " . $resp->faultCode() . ": " . $resp->faultString();
        		log_error("[postfix] {$error}");
        		file_notice("sync_settings", $error, "Postfix Settings Sync", "");
        	} else {
        		log_error("[postfix] XMLRPC sync successfully completed with {$url}:{$port}.");
        	}
        
        	/* Tell postfix to reload our settings on the destionation sync host. */
        	$method = 'pfsense.exec_php';
        	$execcmd = "require_once('/usr/local/pkg/postfix.inc');\n";
        	$execcmd .= "sync_package_postfix('yes');";
        
        	/* Assemble XMLRPC payload. */
        	$params = array(XML_RPC_encode($password), XML_RPC_encode($execcmd));
        	log_error("[postfix] XMLRPC reload data {$url}:{$port}.");
        	$msg = new XML_RPC_Message($method, $params);
        	$cli = new XML_RPC_Client('/xmlrpc.php', $url, $port);
        	$cli->setCredentials($username, $password);
        	$resp = $cli->send($msg, $synctimeout);
        	if (!$resp) {
        		$error = "A communications error occurred while attempting XMLRPC sync with {$url}:{$port} (pfsense.exec_php).";
        		log_error("[postfix] {$error}");
        		file_notice("sync_settings", $error, "postfix Settings Sync", "");
        	} elseif ($resp->faultCode()) {
        		$cli->setDebug(1);
        		$resp = $cli->send($msg, $synctimeout);
        		$error = "An error code was received while attempting XMLRPC sync with {$url}:{$port} - Code " . $resp->faultCode() . ": " . $resp->faultString();
        		log_error("[postfix] {$error}");
        		file_notice("sync_settings", $error, "postfix Settings Sync", "");
        	} else {
        		log_error("[postfix] XMLRPC reload data success with {$url}:{$port} (pfsense.exec_php).");
        	}
        }
        
        ?></eof<br></mastereof2<br></mastereof<br></eof<br></eof<br></eof<br></eof<br></eof<br></about<br> 
        
        1 Reply Last reply Reply Quote 0
        • P
          poteh
          last edited by

          Solved my problem. Our AD wanted username in user@domain.ru format. So I edited /usr/local/bin/adexport.pl file

          
          :51#our $bind    = $ARGV[2].','.$ARGV[1];  # AD account 
          our $bind    = $ARGV[2];
          
          

          and filled the domain field as DC=TESTDOMAIN,DC=RU, username field as pfsense@testdomain.ru and that works.

          1 Reply Last reply Reply Quote 0
          • R
            Ralph-DE
            last edited by

            After upgrade to pfSense 2.3.3 Postfix does not start any more. The error message is "shared library libicuuc.so.57 not found".
            Any help?

            1 Reply Last reply Reply Quote 0
            • BismarckB
              Bismarck
              last edited by

              @Ralph-DE:

              After upgrade to pfSense 2.3.3 Postfix does not start any more. The error message is "shared library libicuuc.so.57 not found".
              Any help?

              Which version of Postfix do you run? It looks like you need to update the postfix/icu pkg.

              https://www.freshports.org/mail/postfix/

              search for other commits by this committer

              devel/icu: update to 58.1

              Changes: http://site.icu-project.org/download/58
              PR: 214384
              Exp-run by: antoine
              Approved by: office (bapt)

              Try: pkg install postfix icu pcre

              1 Reply Last reply Reply Quote 0
              • marcellocM
                marcelloc
                last edited by

                How many people does still need antispam and dkim outgoing mail signing feature running on pfSense?

                I know Netgate does not want or need it as a package on current pfSense versions but I'm updating postfix package to 2.3.x as a manual procedure in the user at your own risk way.

                Treinamentos de Elite: http://sys-squad.com

                Help a community developer! ;D

                1 Reply Last reply Reply Quote 0
                • N
                  n3by
                  last edited by

                  @marcelloc:

                  …
                  How many people does still need this running on pfSense?

                  I know netgate does not want or need it as a package on current versions(I've asked a lot of times), but I can try to update it to 2.3.x or 2.4 as a manual procedure in the user at your own risk state.

                  I will say this is a must if you want to be sure that at least pfsense notification will be emailed to you.
                  If wan ( or lan ) go down and you don't use this package, you will lose all notification and is a good chance that logs will be overwritten until connection is fixed.
                  And in my case I am using it also as a backup (mx2) for primary mail server (mx1) that is on another location…

                  1 Reply Last reply Reply Quote 0
                  • marcellocM
                    marcelloc
                    last edited by

                    Install process and search mail tab is almost done. Will take a look on widgets, view config and queue tab.

                    The process will be simple as execute a script on console/ssh.  ;)

                    postfix-2.3.3.PNG
                    postfix-2.3.3.PNG_thumb
                    postfix-2.3.3_01.PNG
                    postfix-2.3.3_01.PNG_thumb
                    postfix-2.3.3_02.PNG
                    postfix-2.3.3_02.PNG_thumb

                    Treinamentos de Elite: http://sys-squad.com

                    Help a community developer! ;D

                    1 Reply Last reply Reply Quote 0
                    • BismarckB
                      Bismarck
                      last edited by

                      That are great news! Thank YOU!  :)

                      1 Reply Last reply Reply Quote 0
                      • D
                        dalmatian81
                        last edited by

                        Hello!

                        Does somebody have a modified system.inc for PFsenese 2.3.3 ?  ( It doesn't work with system.inc from attached pfSense-2.3-Postfix.zip…. PFsense doesn't load saved configuration... ) :( :( :(

                        1 Reply Last reply Reply Quote 0
                        • marcellocM
                          marcelloc
                          last edited by

                          @dalmatian81:

                          Hello!

                          Does somebody have a modified system.inc for PFsenese 2.3.3 ?  ( It doesn't work with system.inc from attached pfSense-2.3-Postfix.zip…. PFsense doesn't load saved configuration... ) :( :( :(

                          I've finished the code update for 2.3.x.  As it will not be an official package, I'm finishing a script/manual install for this package.

                          Treinamentos de Elite: http://sys-squad.com

                          Help a community developer! ;D

                          1 Reply Last reply Reply Quote 0
                          • BismarckB
                            Bismarck
                            last edited by

                            @dalmatian81:

                            Hello!

                            Does somebody have a modified system.inc for PFsenese 2.3.3 ?  ( It doesn't work with system.inc from attached pfSense-2.3-Postfix.zip…. PFsense doesn't load saved configuration... ) :( :( :(

                            Here is my running /etc/inc/system.inc attached, I'm using the Patches package with Auto Apply, so it will be auto patched after an pfSense update has deleted the maillog line.

                            --- system.inc	2017-03-08 11:19:12.000000000 +0100
                            +++ system-new.inc 2017-03-08 11:21:39.000000000 +0100
                            @@ -1164,6 +1164,7 @@
                             local4.*							{$log_directive}{$g['varlog_path']}/portalauth.log
                             local5.*							{$log_directive}{$g['varlog_path']}/nginx.log
                             local7.*							{$log_directive}{$g['varlog_path']}/dhcpd.log
                            +mail.*						/var/log/maillog
                             *.notice;kern.debug;lpr.info;mail.crit;daemon.none;news.err;local0.none;local3.none;local4.none;local7.none;security.*;auth.info;authpriv.info;daemon.info	{$log_directive}{$g['varlog_path']}/system.log
                             auth.info;authpriv.info 					|exec /usr/local/sbin/sshlockout_pf 15
                             *.emerg							*
                            

                            And don't forget to reboot after patching. :)

                            system.zip

                            1 Reply Last reply Reply Quote 0
                            • D
                              dalmatian81
                              last edited by

                              Thank you Bismarck - It works !!!

                              P.S. for others

                              Next edit:

                              /conf/config.xml

                              • and add Postfix to the Service Status and Menu:

                              <service><name>postfix</name>
                                      <rcfile>postfix.sh</rcfile>
                                      <executable>master</executable></service>

                              <menu>
                                      <name>Postfix Forwarder</name>
                                      <tooltiptext>Configure Postfix Forwarder</tooltiptext>
                                     Services
                                      <url>/pkg_edit.php?xml=postfix.xml&id=0</url>
                                   </menu>

                              <menu>
                                      <name>Search Mail</name>
                                      <tooltiptext>Search postfix logs</tooltiptext>
                                     Diagnostics
                                      <url>/postfix_search.php</url>
                                   </menu>

                              <menu>
                                      <name>Postfix Queue</name>
                                      <tooltiptext>check postfix queue</tooltiptext>
                                     Status
                                      <url>/postfix_queue.php</url>
                                   </menu>

                              Those must be inserted in the <installedpackages>section  :)</installedpackages>

                              1 Reply Last reply Reply Quote 0
                              • marcellocM
                                marcelloc
                                last edited by

                                Hi everybody.

                                It's finally done  8)

                                Here are install instructions for UNOFFICIAL postfix package for pfSense(R) software 2.3.x

                                Under console/ssh, fetch the install script, check what it does if you want and then execute it.

                                
                                cd /root
                                fetch https://raw.githubusercontent.com/marcelloc/Unofficial-pfSense-packages/master/pkg-postfix/files/install_postfix_23.sh
                                sh ./install_postfix_23.sh
                                
                                

                                Once it finishes, all must be in place. If you do not see the menu after it finishes, try to install any pfSense package from GUI, like cron for example.

                                WARNING

                                Use it at your own risk.

                                This script install packages from freebsd and change your config file.

                                Treinamentos de Elite: http://sys-squad.com

                                Help a community developer! ;D

                                1 Reply Last reply Reply Quote 0
                                • BismarckB
                                  Bismarck
                                  last edited by

                                  Thank you looks very good so far, just one thing, the Widget always shows reject = 0.

                                  1 Reply Last reply Reply Quote 0
                                  • marcellocM
                                    marcelloc
                                    last edited by

                                    @Bismarck:

                                    Thank you looks very good so far, just one thing, the Widget always shows reject = 0.

                                    I've updated some improvements on log to database function and search as well. Try updating the gui files or running the install process again.

                                    Also check if you have reject logs on /var/log/maillog.

                                    postfix_widget.PNG
                                    postfix_widget.PNG_thumb

                                    Treinamentos de Elite: http://sys-squad.com

                                    Help a community developer! ;D

                                    1 Reply Last reply Reply Quote 0
                                    • marcellocM
                                      marcelloc
                                      last edited by

                                      To follow updates on the package, check

                                      https://github.com/marcelloc/Unofficial-pfSense-packages/commits/master/pkg-postfix

                                      Treinamentos de Elite: http://sys-squad.com

                                      Help a community developer! ;D

                                      1 Reply Last reply Reply Quote 0
                                      • BismarckB
                                        Bismarck
                                        last edited by

                                        Hello marcelloc, I did run the install process again but no luck, reject is still 0 and I have different stats about the spam count in MailWatch as well.

                                        Any idea?

                                        BTW SPF and DKIM integration is awesome, thank you!

                                        1 Reply Last reply Reply Quote 0
                                        • marcellocM
                                          marcelloc
                                          last edited by

                                          Do you have any non word character on server name like antispam-01 ?

                                          The stats on widget are based on destination recipients. Is this what mailwatch does?

                                          A message sid can have more then one destination recipient.

                                          The spam message on widget is specific for spamassassin message that has the alert on logs with 'is spam'.

                                          Treinamentos de Elite: http://sys-squad.com

                                          Help a community developer! ;D

                                          1 Reply Last reply Reply Quote 0
                                          • BismarckB
                                            Bismarck
                                            last edited by

                                            @marcelloc:

                                            Do you have any non word character on server name like antispam-01 ?

                                            No its just pfsense

                                            The stats on widget are based on destination recipients. Is this what mailwatch does?

                                            Yes, but it looks like the widget just counts high scored spam and not all, same when searching for spam in postfix_search.php it just finds high scored spam and the numbers of high scored spam are are always the same in the widget and MailMatch.

                                            The spam message on widget is specific for spamassassin message that has the alert on logs with 'is spam'.

                                            Yes, but for some odd reason, only the high scored spam gets logged to sqlite.

                                            In the first unofficial version, the logging to sqlite was working fine, nothing changed since with my setup, except the new Postfix package.

                                            If you like I can send you my maillog?

                                            /edit

                                            Searching for spam in postfix_search.php before the update in a sqlite db it shows all spam messages, the low and high scored.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.