On Fri, Sep 28, 2012 at 08:58:33AM -0300, francis picabia wrote: > When the remote site attempts to deliver it is caught in blocklist: > > Sep 28 05:29:50 mx10 postfix/postscreen[15338]: NOQUEUE: reject: RCPT > from [210.44.128.104]:33372: 550 5.7.1 Service unavailable; client > [210.44.128.104] blocked using b.barracudacentral.org; > from=<sheryl.s...@sdufe.edu.cn>, to=<john...@example.com>, > proto=ESMTP, helo=<sdfi.edu.cn> > > I already have this: > > # grep postscreen /etc/postfix/main.cf > postscreen_dnsbl_action = enforce > postscreen_greet_action = enforce > postscreen_dnsbl_threshold = 2 > postscreen_dnsbl_sites = licensekey.zen.dq.spamhaus.net*2, > b.barracudacentral.org*2, bl.spamcop.net*1
Note, with these settings you won't ever use the Spamcop result. There should be other 1-point postscreen_dnsbl_sites. This is equivalent to: # postscreen_dnsbl_threshold not set postscreen_dnsbl_sites = licensekey.zen.dq.spamhaus.net, b.barracudacentral.org > postscreen_access_list = cidr:/etc/postfix/postscreen_access, > permit_mynetworks > postscreen_dnsbl_reply_map = texthash:/etc/postfix/dnsbl_reply > > # cat postscreen_access > 210.44.128.104 PERMIT > > Is 'postscreen_blacklist_action = enforce' the missing link to > whitelist it? This is a good question. My copy of postconf.5.html says: postscreen_blacklist_action (default: ignore) The action that postscreen(8) takes when a remote SMTP client is permanently blacklisted with the postscreen_access_list parameter. ... It does not mention what happens when the postscreen_access_list returns PERMIT, but the name and description implies that it only refers to blacklisted clients. Digging a bit further: postscreen_access_list (default: permit_mynetworks) Permanent white/blacklist for remote SMTP client IP addresses. postscreen(8) searches this list immediately after a remote SMTP client connects. Specify a comma- or whitespace-separated list of commands (in upper or lower case) or lookup tables. The search stops upon the first command that fires for the client IP address. ... permit Whitelist the client and terminate the search. Do not subject the client to any before/after 220 greeting tests. Pass the connection immediately to a Postfix SMTP server process. reject Blacklist the client and terminate the search. Subject the client to the action configured with the postscreen_blacklist_action configuration parameter. ... This says that postscreen_blacklist_action only applies to reject entries in the postscreen_access_list. > I'd like to have some confidence it is going to work before asking > to "try again". I'd have confidence in what the documentation says. :) Furthermore, I'd go ahead and set "postscreen_blacklist_action = enforce" anyway. You control that list, and presumably you would not want mail from sites listed therein with REJECT. -- http://rob0.nodns4.us/ -- system administration and consulting Offlist GMX mail is seen only if "/dev/rob0" is in the Subject: