Hi list,
I recently configured postscreen on my low volume mailserver and was
pleased to find that it should be possible to avoid de-facto greylisting
when doing the deep protocol tests by using a backup MX IP on the same
host.
After enabling this setup I found that the first client to connect did
not get treated as I had expected. The client connected to the primary
MX and got deferred, immediately went to the secondary MX and also got
deferred. The log snippet below suggests that whitelisting from the
initial connection completed after the connection to the secondary MX
and was therefore too late to be effective.
Nov 13 10:01:35 mica postfix/postscreen[15110]: CONNECT from
[85.115.54.190]:48691 to [95.172.3.114]:25
Nov 13 10:01:41 mica postfix/tlsproxy[15121]: CONNECT from
[85.115.54.190]:48691
Nov 13 10:01:41 mica postfix/tlsproxy[15121]: Anonymous TLS connection
established from [85.115.54.190]:48691: TLSv1 with cipher
DHE-RSA-AES256-SHA (256/256 bits)
Nov 13 10:01:41 mica postfix/postscreen[15110]: NOQUEUE: reject: RCPT
from [85.115.54.190]:48691: 450 4.3.2 Service currently unavailable;
from=<sender...@example.com>, to=<recipient...@example.co.uk>,
proto=ESMTP, helo=<cluster-j.mailcontrol.com>
Nov 13 10:01:41 mica postfix/postscreen[15110]: CONNECT from
[85.115.54.190]:44580 to [95.172.3.115]:25
Nov 13 10:01:41 mica postfix/postscreen[15110]: WHITELIST VETO
[85.115.54.190]:44580
Nov 13 10:01:47 mica postfix/tlsproxy[15121]: CONNECT from
[85.115.54.190]:44580
Nov 13 10:01:47 mica postfix/tlsproxy[15121]: Anonymous TLS connection
established from [85.115.54.190]:44580: TLSv1 with cipher
DHE-RSA-AES256-SHA (256/256 bits)
Nov 13 10:01:47 mica postfix/postscreen[15110]: NOQUEUE: reject: RCPT
from [85.115.54.190]:44580: 450 4.3.2 Service currently unavailable;
from=<sender...@example.com>, to=<recipient...@example.co.uk>,
proto=ESMTP, helo=<cluster-j.mailcontrol.com>
Nov 13 10:01:47 mica postfix/postscreen[15110]: DISCONNECT
[85.115.54.190]:44580
Nov 13 10:01:47 mica postfix/tlsproxy[15121]: DISCONNECT
[85.115.54.190]:44580
Nov 13 10:01:47 mica postfix/postscreen[15110]: PASS NEW
[85.115.54.190]:48691
Nov 13 10:01:47 mica postfix/postscreen[15110]: DISCONNECT
[85.115.54.190]:48691
Nov 13 10:01:47 mica postfix/tlsproxy[15121]: DISCONNECT
[85.115.54.190]:48691
Have I correctly understood the chain of events here and if so what is
the likely cause? I am running this on Ubuntu 12.04 using the latest
Postfix version in the standard repos (2.9.3-2). The non-default
postscreen settings I have used are:
# postconf -n | grep 'postscreen_.*'
postscreen_access_list = permit_mynetworks
cidr:/etc/postfix/postscreen_access.cidr
postscreen_bare_newline_enable = yes
postscreen_dnsbl_action = enforce
postscreen_dnsbl_sites = zen.spamhaus.org*3 b.barracudacentral.org*2
dnsbl.njabl.org*2 bl.spameatingmonkey.net*2 dnsbl.ahbl.org
bl.spamcop.net dnsbl.sorbs.net spamtrap.trblspam.com swl.spamhaus.org*-5
list.dnswl.org=127.[0..255].[0..255].0*-2
list.dnswl.org=127.[0..255].[0..255].1*-4
list.dnswl.org=127.[0..255].[0..255].[2..255]*-6
postscreen_dnsbl_threshold = 3
postscreen_greet_action = enforce
postscreen_non_smtp_command_enable = yes
postscreen_pipelining_enable = yes
postscreen_whitelist_interfaces = !95.172.3.115 static:all
Regards,
Mike