Show HN: Self-Validating Email Aliases for Postfix
I sort do this a different way. I have a custom domain and use that with Google's G Suite. I set the catch-all email to my email. Then everything I sign up with gets a different email address, like amazon@<mydomain>. I use a password manager to track all the different emails/passwds. This has helped me catch the water company giving out my email. I got junk mail asking me to sign up with my email utilities-water@<mydomain>. If a particular email starts getting spam, I just blacklist the To: address.
Why require a patched Postfix merely to use a localhost address and port as a lookup table? I would assume that a unix domain socket should be acceptable?
I want to thank HN and the HN community for the awesome free exposure. It means a tremendous amount to a niche open source project. I'm sure I can attribute 6 clones and 20 GitHub stars to this, hopefully some of those turn into users and possibly even contributors. Thanks again...
You can point alias_maps to a SQL table too. So adding and removing alias can be done on the fly. No patching.
One can also use UAE, the '+' symbol after the user portion in postfix - don't need new alias. Then use a dedicated UAE base address "spam+VENDOR@example.com".
This is quite clever. I have avoided wildcards because I have not wanted to deal with the increased spam sent by bots to random (jane@ eve@) or not so random addresses (webmaster@).
Also for postfix: use port 465 for SSL encryption, https://news.ycombinator.com/item?id=21430013