我已经做了很多关于如何重新configurationpostfix以在不同端口上工作的search引擎,但是我仍然不能喜欢人们在我的master.cf中继续讨论的行。 我使用的是OS X Mountain Lion,我的ISP阻塞了端口25上的双向通信。
人们说要找一条线说
smtp inet n - n - - smtpd
我找不到
这是(我相信是)未经修改
# ==== Begin auto-generated section ======================================== # This section of the master.cf file is auto-generated by the Server Admin # Mail backend plugin whenever mails settings are modified. smtp inet n - n - 1 postscreen smtpd pass - - n - - smtpd dnsblog unix - - n - 0 dnsblog tlsproxy unix - - n - 0 tlsproxy submission inet n - n - - smtpd -o smtpd_tls_security_level=encrypt smtp unix - - n - - smtp # === End auto-generated section =========================================== # Modern SMTP clients communicate securely over port 25 using the STARTTLS command. # Some older clients, such as Outlook 2000 and its predecessors, do not properly # support this command and instead assume a preconfigured secure connection # on port 465. This was sometimes called "smtps", but such usage was never # approved by the IANA and therefore conflicts with another, legitimate assignment. # For more details about managing secure SMTP connections with postfix, please see: # http://www.postfix.org/TLS_README.html # To read more about configuring secure connections with Outlook 2000, please read: # http://support.microsoft.com/default.aspx?scid=kb;en-us;Q307772 # Apple does not support the use of port 465 for this purpose. # After determining that connecting clients do require this behavior, you may choose # to manually enable support for these older clients by uncommenting the following # four lines. #465 inet n - n - - smtpd # -o smtpd_tls_wrappermode=yes # -o smtpd_sasl_auth_enable=yes # -o smtpd_client_restrictions=permit_sasl_authenticated,reject # -o milter_macro_daemon_name=ORIGINATING #628 inet n - n - - smtp pickup fifo n - n 60 1 pickup cleanup unix n - n - 0 cleanup qmgr fifo n - n 300 1 qmgr #qmgr fifo n - n 300 1 oqmgr tlsmgr unix - - n 1000? 1 tlsmgr rewrite unix - - n - - trivial-rewrite bounce unix - - n - 0 bounce defer unix - - n - 0 bounce trace unix - - n - 0 bounce verify unix - - n - 1 verify sacl-cache unix - - n - 1 sacl-cache flush unix n - n 1000? 0 flush proxymap unix - - n - - proxymap proxywrite unix - - n - 1 proxymap # When relaying mail as backup MX, disable fallback_relay to avoid MX loops relay unix - - n - - smtp -o smtp_fallback_relay= # -o smtp_helo_timeout=5 -o smtp_connect_timeout=5 showq unix n - n - - showq error unix - - n - - error retry unix - - n - - error discard unix - - n - - discard local unix - nn - - local virtual unix - nn - - virtual lmtp unix - - n - - lmtp anvil unix - - n - 1 anvil scache unix - - n - 1 scache # # ==================================================================== # Interfaces to non-Postfix software. Be sure to examine the manual # pages of the non-Postfix software to find out what options it wants.
只是为了澄清,我不需要收到邮件,我只需要发送邮件,所以只要我发送邮件给每个电子邮件客户端(雅虎,Gmail,Hotmail,AOL,COX等)。 如果您的端口25被阻止,该post的想法是能够从Ruby或PHP发送邮件。
你想达到什么目的?
入站邮件 :其他SMTP服务器(在外部)要求使用端口25向您发送邮件。 即使您将端口更改为25250,其他端口也不知道他们需要访问此端口才能发送邮件给您。
出站邮件 :您的服务器不使用端口25作为发送邮件的源端口。 它使用端口25作为(外部)服务器上的目标端口。 无论您尝试在本地configuration哪个端口,都无法影响外部世界。
通过(外部)智能主机中继邮件 :只要服务器智能主机接受不同端口上的邮件就可以了。 http://www.postfix.org/postconf.5.html#relayhost
所以事实certificate,cox只能阻塞端口25上的stream量,而不是stream向cox服务器,所以最简单的方法是进入main.cf并设置一个relayhost。 幸运的是,cox允许你在smtp.cox.net上使用他们的服务器,它监听端口25。
relayhost = [smtp.cox.net]:25
您正在使用端口587(提交)现在是正确的而不是25.你需要configuration你的客户端使用端口587,如果他们不这样做已经自动。
你需要看到的是:
submission inet n - n - - smtpd
你的configuration在这一点上看起来不错。
只是为了完整性,你看不到一条线
smtp inet n - n - - smtpd
在master.cf因为你在Postfix前面运行Postscreen :
smtp inet n - n - 1 postscreen smtpd pass - - n - - smtpd