----- Original Message -----

>From: Wietse Venema 
>To: Postfix users <postfix-users@postfix.org>
>Sent: Tuesday, July 5, 2011 5:38 PM
>Subject: Re: unverified_recipient_tempfail_action = permit
>
>>Reindl Harald:
>> Am 05.07.2011 16:55, schrieb Wietse Venema:
>> > If no such problem exists, then we know that cache expiration
>> > has nothing to do with the issue and we can move on.
>> > 
>> > When the address verify cache works properly, it should become
>> > populated over time (by spammers, by legitimate sites that have
>> > very short SMTP timeouts, or by legitimate sites that try to deliver
>> > to the backup after the primary replies with a 4xx response).
>> > 
>> > There is no need to turn Postfix into a backscatter source by
>> > accepting all mail when the primary is down.  Just set the cache
>> > expiration time to 100 days or so. Meanwhile I'll see if it is safe
>> > to purge a recipient from the cache when the primary says that it
> >> no longer exists. Maybe Postfix needs to wait for two negative
>> > responses.
>> 
>> sorry - but how should this work?
>> 
>> suggesting the primary is 99.9% of the time up there comes
>> nothing to the backup-mx and if it comes there it is too late
>
>According to my postscreen stats, some 14% of spambots connects
>only to my secondary MX address (I have one postscreen process
>listen on both primary and secondary IP addresses for testing).  
>
>For examples of legitimate backup MX connections while the primary
>is up, see the second paragraph in the quoted text above. That is
>not the complete list of examples that I can come up with. When
>primary and backup are in physically different networks, there can
>be outages or congestion that make only the primary MX unreachable.
>
>    Wietse

I will run the tests and get the output for you later tonight but my suspicion
is that there was likely nothing wrong with the address cache, just that
a lot of addresses had never been probed by the secondary mx as the
primary mx is up virtually 99.9% of the time.

We have some domains that are very unlikely to be known by spammers
(they are in the .aero tld) and, due to a lot of European staff and the policy
of first_letter_of_first_name.lastn...@domain.aero, most email addresses
are not easily guessable by a spammer performing a dictionary attack.

In any case, surely it would be more elegant/nicer to give the sysadmin a
choice of failure mode for when the primary temporarily stops responding
to verification probes. After all, there is nothing stopping (AFAIK) a user
from configuring postifx such that it is forced to accept
everyth...@domain.com (i.e. disabling address verification all together).
If you are worried about backscatter, that is already a potential problem
anyway.

Reply via email to