danami
Silver Pleskian
Username:
TITLE
Saving the Mail Server Settings page resets smtpd_recipient_restrictions
PRODUCT, VERSION, OPERATING SYSTEM, ARCHITECTURE
Product version: Plesk Obsidian 18.0.45.2
OS version: AlmaLinux 8.6 x86_64
Build date: 2022/07/22 09:00
Revision: eb4e2a3b37f5171bb9212b7a720f51b9edddefaf
PROBLEM DESCRIPTION
Postfix allows admins to set spam fighting restrictions in /etc/postfix/main.cf so that Spam can be blocked at the smtp level before it goes to SpamAssassin or Amavis. Extensions like Plesk Email Security try to set these options.
The problem is that Plesk erases those extra restrictions when the Mail Server Settings page is saved.
For example:
Enabling "Postfix - Strict Rules" in Plesk email security sets an extra restriction in smtpd_recipient_restrictions like:
Then when the Mail Server Page is saved these settings are erased and reset to:
The result is that the admin thinks that "Postfix - Strict Rules" are set when some of them are erased.
You should also note that it resets these differently between rpm and debian versions (which is likely another bug).
On AlmaLinux 8 it gets reset to:
On Debian/Ubuntu it gets reset to:
STEPS TO REPRODUCE
1. Add any extra restrictions like "reject_non_fqdn_recipient, reject_unknown_recipient_domain" to smtpd_recipient_restrictions manually or by enabling "Postfix - Strict Rules" using the Plesk Email Security extension.
2. Go to Tools and Settings -> Mail Server Settings and save the page.
ACTUAL RESULT
smtpd_recipient_restrictions will be reset again to :
with the new restrictions removed.
EXPECTED RESULT
Plesk should should only reset smtpd_recipient_restrictions if it detects that reject_unauth_destination is missing (which would result in an open relay).
This would fix Plesk Email Security and improve spam fighting options being set.
ANY ADDITIONAL INFORMATION
(DID NOT ANSWER QUESTION)
YOUR EXPECTATIONS FROM PLESK SERVICE TEAM
Confirm bug
TITLE
Saving the Mail Server Settings page resets smtpd_recipient_restrictions
PRODUCT, VERSION, OPERATING SYSTEM, ARCHITECTURE
Product version: Plesk Obsidian 18.0.45.2
OS version: AlmaLinux 8.6 x86_64
Build date: 2022/07/22 09:00
Revision: eb4e2a3b37f5171bb9212b7a720f51b9edddefaf
PROBLEM DESCRIPTION
Postfix allows admins to set spam fighting restrictions in /etc/postfix/main.cf so that Spam can be blocked at the smtp level before it goes to SpamAssassin or Amavis. Extensions like Plesk Email Security try to set these options.
The problem is that Plesk erases those extra restrictions when the Mail Server Settings page is saved.
For example:
Enabling "Postfix - Strict Rules" in Plesk email security sets an extra restriction in smtpd_recipient_restrictions like:
Code:
smtpd_recipient_restrictions = permit_mynetworks,permit_sasl_authenticated,reject_unauth_destination,reject_invalid_helo_hostname
Then when the Mail Server Page is saved these settings are erased and reset to:
Code:
smtpd_recipient_restrictions = permit_mynetworks, reject_unauth_destination
The result is that the admin thinks that "Postfix - Strict Rules" are set when some of them are erased.
You should also note that it resets these differently between rpm and debian versions (which is likely another bug).
On AlmaLinux 8 it gets reset to:
Code:
smtpd_recipient_restrictions = permit_mynetworks, reject_unauth_destination
On Debian/Ubuntu it gets reset to:
Code:
smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination
STEPS TO REPRODUCE
1. Add any extra restrictions like "reject_non_fqdn_recipient, reject_unknown_recipient_domain" to smtpd_recipient_restrictions manually or by enabling "Postfix - Strict Rules" using the Plesk Email Security extension.
2. Go to Tools and Settings -> Mail Server Settings and save the page.
ACTUAL RESULT
smtpd_recipient_restrictions will be reset again to :
Code:
smtpd_recipient_restrictions = permit_mynetworks, reject_unauth_destination
with the new restrictions removed.
EXPECTED RESULT
Plesk should should only reset smtpd_recipient_restrictions if it detects that reject_unauth_destination is missing (which would result in an open relay).
This would fix Plesk Email Security and improve spam fighting options being set.
ANY ADDITIONAL INFORMATION
(DID NOT ANSWER QUESTION)
YOUR EXPECTATIONS FROM PLESK SERVICE TEAM
Confirm bug