from time to time I receive emails from my own TLD. Those are spoofed emails where someone connects directly to my Yunohost mail server and just spoof the from. I see it is an issue that pops from time-to-time, eg. Spoofing adresse mail
I tried to connect manually to my server from an outside network (tethering from my mobile) and fair enough, it worked like a charm (replacing my TLD with example.com for privacy):
ben@erebor:~$ telnet example.com smtp Trying xx.xx.xx.xx... Connected to example.com. Escape character is '^]'. 220 example.com Service ready EHLO example.com 250-example.com 250-PIPELINING 250-SIZE 35914708 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING MAIL FROM:<email@example.com> 250 2.1.0 Ok RCPT TO:<firstname.lastname@example.org> 250 2.1.5 Ok DATA 354 End data with <CR><LF>.<CR><LF> Hello . 250 2.0.0 Ok: queued as 1A4D4A3AEF Connection closed.
I checked and my postfix config looks pristine and up-to-date. Am I the only one?