On 5/8/20 2:11 PM, Mark Dadgar wrote:
The easy fix was to edit the [mta] setting in mailman.cfg to deliver email via the submit port instead, which has no filtering applied to it:
smtp_host: localhost # using the submit port bypasses spamassassin filtering on outgoing list email smtp_port: 587 smtp_user: mm3send <— I created this user for this purpose smtp_pass: <password-for-mm3send-user>
This works great and can be applied to any email filtering.
We tend to do this differently. For example, on mail.python.org which currently has 261 Mailman 2.1 lists and 134 Mailman 3 lists and sends about 135,000 individual messages per day from the two Mailman instances, we define in /etc/postfix/master.cf
127.0.0.1:8026 inet n - - - - smtpd -o smtpd_authorized_xforward_hosts=127.0.0.0/8 -o mynetworks=127.0.0.0/8 -o smtpd_recipient_restrictions=permit_mynetworks,reject -o smtpd_client_restrictions= -o smtpd_helo_restrictions= -o smtpd_sender_restrictions= -o smtpd_data_restrictions= -o receive_override_options=no_unknown_recipient_checks -o smtpd_milters=inet:127.0.0.1:8891
Then port 8026 only accepts locally generated mail and only does dkim signing (milter on port 8891) and essentially no other checks.
Then in the [mta] section in mailman.cfg we only need
smtp_port: 8026
-- Mark Sapiro <mark@msapiro.net> The highway is for gamblers, San Francisco Bay Area, California better use your sense - B. Dylan