Le vendredi 17 juin 2011 21:54, Victor Duchovni a écrit : > On Fri, Jun 17, 2011 at 09:44:00PM +0200, m...@smtp.fakessh.eu wrote: > > Le vendredi 17 juin 2011 21:39, Victor Duchovni a ?crit?: > > > In that case you've over-engineered your configuration as was my guess. > > > Now you need to construct something more restrained. > > > > So I understand > > > > how to build something cleaner > > Start with zero changes, and change only parameters that must > be changed to meet your goals.
I come to this. when do you r13151 ~]# postconf -n | egrep postscreen postscreen_access_list = permit_mynetworks postscreen_bare_newline_action = enforce postscreen_bare_newline_enable = yes postscreen_blacklist_action = drop postscreen_cache_map = btree:$data_directory/postscreen_cache postscreen_client_connection_count_limit = $smtpd_client_connection_count_limit postscreen_disable_vrfy_command = $disable_vrfy_command postscreen_dnsbl_action = enforce postscreen_dnsbl_reply_map = texthash:/etc/postfix/dnsbl_reply postscreen_dnsbl_sites = cbl.abuseat.org*2, bl.spamcop.net*1, b.barracudacentral.org*2 ,zen.spamhaus.org*3 ,sbl.spamhaus.org*2,xbl.spamhaus.org*2 postscreen_dnsbl_threshold = 2 postscreen_enforce_tls = $smtpd_enforce_tls postscreen_expansion_filter = $smtpd_expansion_filter postscreen_forbidden_commands = $smtpd_forbidden_commands postscreen_greet_action = enforce postscreen_greet_banner = $smtpd_banner postscreen_helo_required = $smtpd_helo_required postscreen_non_smtp_command_action = drop postscreen_non_smtp_command_enable = yes postscreen_pipelining_action = enforce postscreen_pipelining_enable = yes postscreen_tls_security_level = $smtpd_tls_security_level postscreen_use_tls = $smtpd_use_tls -- http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x092164A7 gpg --keyserver pgp.mit.edu --recv-key 092164A7
pgpHk3zt45xWw.pgp
Description: PGP signature