On Thursday 15 December 2011 08:24:51 Gábor Lénárt wrote: > On Thu, Dec 15, 2011 at 08:19:18AM -0600, /dev/rob0 wrote: > > On Thursday 15 December 2011 07:53:35 Tomas Macek wrote: > > > But we have clients, that send mails on both port 25 and > > > 587. I really cannot use postscreen? I don't understand > > > why exactly. What will happen if I use it? > > > > You might reject some MUA clients, and if using after-220 > > tests, you will be getting phone calls from confused users. > > Btw: > > I am thinking to use postscreen with mail submission server as > well since its rbl check seems to be better in performance than > using smtpd's one.
The difference is in how it is done. smtpd checks each DNSBL in sequence, while postscreen hits them all in parallel. The benefit is that a score can be calculated from all results, rather than smtpd's absolute yes-or-no decisions. > Since I want also block some of the IPs even in case > of mail submission (eg: user's account is stolen etc) with an > own hosted BL for this purpose, Not a good example. If a user's credentials are used for spamming, your best option is to revoke those credentials. A local DNSBL isn't going to block those effectively. Even if it did, I think the smtpd's way of doing it would make sense; you don't want anything from addresses in your local DNSBL. > I guess it's not a problem to use > postscreen in case of mail submission, if I don't use other > features of postscreen too much - at least not for mail > submission. Is it a good idea at all? I would guess not. There are better ways to deal with the issues mentioned here. There are a lot of MUA implementations, many of them not so good, much like spam zombies. Since postscreen was made to fight zombies, it does not sound like a good thing to put between the server and your own users. I'd echo what Wietse said about policy services, and also suggest content filtering on your submission stream. -- Offlist mail to this address is discarded unless "/dev/rob0" or "not-spam" is in Subject: header