On 2024-01-10 at 10:12:26 UTC-0500 (Wed, 10 Jan 2024 17:12:26 +0200)
Nikolaos Milas via Postfix-users <nmi...@noa.gr>
is rumored to have said:

[...]
and this causes legitimate mail to be discarded (actual mail addresses modified above).

My question in this case: If I understand right, it seems that postscreen allows the client connection even though it is listed because it uses a cache which serves as a useful buffer; however the client is subsequently blocked by reject_rbl_client restrictions.

So, it seems I should I entirely remove the reject_rbl_client filters (from smtpd_recipient_restrictions) as they are already listed with postscreen.

No, that's the wrong lesson.

You should be more selective about your long lists of DNSBLs. They are not all the same thing, and so are not all suitable for use at postscreen time. It seems like you are ignoring the fact that the underlying cause of this rejection is your decision to trust the Spamcop 'bl' list as an absolute blocker, which for most people who value their email is not a good idea. If you want to consistently receive mail from the giant mailbox providers, you need to use more nuanced mechanisms.

It appears to me that using rbl services both with postscreen and smtpd_recipient_restrictions is actually pointless and causes double lookups which in the end make things worse. Postscreen is sufficient and better in filtering with rbl services. Am I right?

Not sufficient and not better. Different.

Postscreen is intended and designed to catch "bots": automated senders of nothing but garbage. It exists to spare systems from running full smtpd processes for what are ultimately no-op sessions. Unless you enable its extended checks, postscreen is very lightweight and fast. That's partly because it has no time-consuming exemption mechanisms (only fast ones.)

Using reject_rbl_client with DNSBLs which occasionally list IPs which send a mix of spam and ham can be made feasible by putting the reject_rbl_client restriction late in the restriction list and having exemption mechanisms ahead of it. For example, I use reject_rbl_client extensively, but with check_*_access maps ahead of those directives. If you like everything about the Spamcop DNSBL except for it listing Microsoft outbounds, you could have a check_client_access directive with a map that permits *.outbound.protection.outlook.com clients before any DNSBL checks (in the same restriction list.)



--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to