<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<div class="moz-cite-prefix">On 9/1/19 2:53 PM, Michael Hallager via
dovecot wrote:<br>
</div>
<blockquote type="cite"
cite="mid:0b4fc829d1140b62029c28b823c177c8@nettrust.nz">On
2019-09-02 06:24, Alexander Dalloz via dovecot wrote:
<br>
<blockquote type="cite" style="color: #000000;">Am 01.09.2019 um
14:41 schrieb Aleksandr Mette via dovecot:
<br>
<blockquote type="cite" style="color: #000000;">4. Forward
e-mail
<br>
</blockquote>
<br>
Don't do that nor let your users auto-forward their mail
received on
<br>
your MX. Else you will end up faster than you think on
blacklists as
<br>
very likely your server will forward SPAM and gets classified as
a
<br>
SPAM source.
<br>
</blockquote>
<br>
You have to let users forward their email because this is
functionality they expect. The trick is to spam scan all email
first, otherwise as Alexander has said, you end up on RBL's.
</blockquote>
<p>Its actually a lot harder than this. Most default installations
I've seen don't take into account Return-Path notifications (i.e.
passing these notifications upstream to the origin),
Troubleshooting last-node delivery issues (user created loops
causing mailserver Denial of service if Quota Management wasn't
properly configured, greylisting, outbound mail suppression) and
Abuse (hacked accounts, interspersed third party server that
truncate the return path to obfuscate the full origin).</p>
<p>Mishandling any of these can result in lowered IP reputation
which would cause you to wind up on an RBL eventually.<br>
</p>
</body>
</html>