On 2/11/2013 4:00 AM, Fabio Sangiovanni wrote:
> Noel Jones <njones <at> megan.vbhcs.org> writes:
> 
>> Seems like the easiest solution is to put permit_sasl_authenticated
>> BEFORE reject_rbl_client.  Then no whitelisting is needed.
>>
>>   -- Noel Jones
>  
> Hi, thanks for your answer.
> Yes, that would be useful, except for malware that steals your credentials,
> and that would be otherwise (hopefully) blocked against lists such as
> Spamhaus XBL. Is it correct?
> I prefer Victor's solution for this reason...
> 
> Thanks again,
> Fabio
> 

Your method of manually whitelisting any IP that happens to be
spamhaus listed doesn't scale very well. Every time some authorized
user travels somewhere, stops at a wifi hotspot, or their home IP
changes, will need to call you to get whitelisted before they can
send mail.  This might be OK if you have only a handful of users and
neither you nor they mind a phone call every time they can't send mail.

A more typical solution is to allow authorized users to send mail
from wherever they happen to be, and use rate limits on postfix via
postfwd or similar to alert you to a possibly compromised account.



  -- Noel Jones

Reply via email to