By: admin
Category:
None
Created: Jan 29, 2026 2:22 PM
Updated: Jan 30, 2026 9:45 PM
Public Note
Zimbra Session Notes - January 29, 2026
Session Overview
Date: January 29, 2026
Duration: Multiple hours
Focus Areas: FromNameSpoof detection, admin account restrictions
Actions Taken
1. FromNameSpoof Detection Implementation
- Identified that FromNameSpoof rules (T_FROMNAME_SPOOFED_EMAIL and T_FROMNAME_EQUALS_TO) were not appearing in email spam headers
- Researched the configuration files and found the rules were defined but not properly loaded
- Added proper configuration to
/opt/zimbra/data/spamassassin/localrules/local.cf:
# Load FromNameSpoof plugin
loadplugin Mail::SpamAssassin::Plugin::FromNameSpoof
# Enable FromNameSpoof plugin with stricter checking
ifplugin Mail::SpamAssassin::Plugin::FromNameSpoof
# Set check level to 0 for strict checking (From:name != From:addr)
# Level 1 allows different TLDs, level 0 is strictest
fns_check 0
score T_FROMNAME_SPOOFED_EMAIL 2.0
score T_FROMNAME_EQUALS_TO 1.5
endif
- Restarted amavisd service to apply changes
- Verified that the rules are now appearing in email headers:
- T_FROMNAME_EQUALS_TO=0.01
- T_FROMNAME_SPOOFED_EMAIL=0.01
- Conducted multiple tests with emails from "Globe Telecom Inc." admin@m3bolt.com
- Confirmed that the system now properly detects name/email mismatches
2. Admin Account Restriction Attempt & Correction
- Initially attempted to restrict admin@m3bolt.com from sending external emails using Postfix sender-dependent relayhost maps
- Created configuration file:
/opt/zimbra/common/conf/sender_relay_restrictions
- Applied changes to Postfix configuration using sender_dependent_relayhost_maps
- This caused the admin account to lose access to Zimbra admin functions and show "maintenance mode"
- Corrective Actions Taken:
- Removed the problematic sender_dependent_relayhost_maps configuration
- Restored admin account status:
zmprov ma admin@m3bolt.com zimbraAccountStatus active
- Restored admin privileges:
zmprov ma admin@m3bolt.com zimbraIsAdminAccount TRUE
- Restarted Zimbra services to ensure proper functionality
- Verified admin account can access admin console and send internal emails
3. Documentation Created
- Created
fromnamespoof_implementation_summary.md - Summary of FromNameSpoof implementation
- Created
fromnamespoof_test_results.md - Test results for FromNameSpoof functionality
- Created
fromnamespoof_updated_status.md - Updated status of FromNameSpoof detection
- Created
admin_external_email_restriction.md - Documentation of restriction method
- Created
comprehensive_solution.md - Detailed solution for admin account restrictions
- Created
admin_external_restriction_approach.md - Approach documentation
Issues Encountered
- Postfix configuration changes affecting admin account functionality
- Complexity of implementing per-account email restrictions in Zimbra
- Syntax challenges with zmmailbox filter rules
Solutions Implemented
- Successfully enabled FromNameSpoof detection with stricter checking (fns_check 0)
- Restored full admin functionality after restriction attempt caused issues
- Documented proper approach for future reference
Current Status
- FromNameSpoof detection is working properly with stricter checking
- Admin account has full functionality restored
- External email restrictions for admin account were not permanently implemented due to functionality risks
- System is stable and operational
Recommendations
- For external email restrictions, implement at the user awareness/training level rather than system level to avoid functionality issues
- Continue monitoring the FromNameSpoof rules to ensure they're properly catching spoofed emails