On Mon, Jul 04, 2011 at 04:48:44AM -0700, Charlie Orford wrote:
> unverified_recipient_tempfail_action = permitĀ  would have solved 
> this problem with the small penalty of a brief period of potential 
> backscatter.
> 
> Where is the down side?

That "small penalty" sure is a down side. If I would provide backup 
service for someone else, I would absolutely insist that the primary 
must never reject my mail for that domain. Let THEM be the spammer, 
not me.

If you're intent on this, you can implement it yourself with simple 
scripts. Best would be a small policy service, but a shell script 
running from crontab would suffice.

The cron job would check to see if the primary MX is reachable, and 
exit if so. A check_recipient_access lookup for the backup domain 
would return "defer" or "defer_if_permit". If the primary MX is not 
available, the access map would be changed to return "dunno".

The cron job continues checking availability of the primary MX, and 
changes the access map back, and optionally runs "postfix flush", 
when the primary MX comes back.

A policy service could do the same thing in real time, without the 
possible delay of the cron job interval. It could also flag clients 
as likely spammers when they attempt to deliver to the backup domain 
while the primary MX is up.

References:
    http://www.postfix.org/SMTPD_ACCESS_README.html
    http://www.postfix.org/access.5.html
    http://www.postfix.org/SMTPD_POLICY_README.html
-- 
    Offlist mail to this address is discarded unless
    "/dev/rob0" or "not-spam" is in Subject: header

Reply via email to