G?bor L?n?rt:
> On Thu, Dec 15, 2011 at 08:19:18AM -0600, /dev/rob0 wrote:
> > On Thursday 15 December 2011 07:53:35 Tomas Macek wrote:
> > > I'd like to use postcreen as some kind of spam protection.
> > > According to documentation
> > > 
> > > * postscreen(8) should not be used on SMTP ports that receive mail
> > > from end-user clients (MUAs). In a typical deployment,
> > > postscreen(8) is used on the "port 25" service, while MUA clients
> > > submit mail via the submission service (port 587) which normally
> > > requires client authentication.
> > > 
> > > 
> > > But we have clients, that send mails on both port 25 and 587. I
> > > really cannot use postscreen? I don't understand why exactly.
> > > What will happen if I use it?
> > 
> > You might reject some MUA clients, and if using after-220 tests, you 
> > will be getting phone calls from confused users.
> 
> Btw:
> 
> I am thinking to use postscreen with mail submission server as well since
> its rbl check seems to be better in performance than using smtpd's one. 
> Since I want also block some of the IPs even in case of mail submission (eg:
> user's account is stolen etc) with an own hosted BL for this purpose, I
> guess it's not a problem to use postscreen in case of mail submission, if I
> don't use other features of postscreen too much - at least not for mail
> submission. Is it a good idea at all?

I'll be happy to discuss how to make postscreen better to distinguish
MTA-to-MTA traffic from other traffic.  I will decline the opportunity
to give a blow-by-blow presentation of how postscreen feature X
will suck when it is used with MUA traffic, and how it could be
made to suck less.

To stop spam caused by a botted client or phished password, a postfwd
or policyd rate limit seems more appropriate to me. This will catch
the bot or spammer before the IP address is blacklisted.

        Wietse

Reply via email to