For me, implementing postscreen has made a significant difference with the 
spam. I had a problem with false positives before I started using postscreen 
and that seemed to be using the sorbs rbl which in turn forced me to use the 
rbl_override. Sorbs seems to be very aggresive and not worth the effort. I have 
since removed it so hopefully this will eliminate the need for rbl_override.



On another topic, I had an issue the other day where an outside sender was 
trying to send e-mail to an internal recipient and their e-mail was getting 
delayed due to a DNS issue on their end. The exact error was:

(Host or domain name not found. Name service error for name=rotary.org type=MX: 
Host not found, try again)



I'm assuming this was happenning due to the reject_unknown_sender_domain in my 
smtpd_recipient_restrictions. It eventually got fixed and the e-mail was able 
to get delivered however in the meantime what would be the best way to bypass 
that person's e-mail address so that e-mail will still get delivered even 
though their server is misconfigured?





Thanks in advance





________________________________
From: owner-postfix-us...@postfix.org [owner-postfix-us...@postfix.org] on 
behalf of Stan Hoeppner [s...@hardwarefreak.com]
Sent: Wednesday, May 22, 2013 4:33 PM
To: postfix-users@postfix.org
Subject: Re: postscreen questions

On 5/22/2013 10:02 AM, Noel Jones wrote:
...
> Secondly, remember postscreen is intended as a quick-and-simple
> zombie killer, its only purpose is to reduce the workload on the
> more complex filters further downstream.

This fact is not emphasized often enough.

Many people forget the intended purpose of postscreen, or simply never
read the opening of the docs, and falsely see it as a replacement for
smtpd_foo_restricions, policy daemons, firewalls, etc.  This is a direct
result of the feature creep late in the development of postscreen.
While the added features are beneficial to some, they are not a
replacement for most of the existing antispam features of Postfix and
popular addons.

In fact, for low volume servers, using postscreen can be more trouble
than it's worth according to many posts here, especially if 'after 220'
tests are enabled without fully understanding the ramifications.

I've personally never configured postscreen.  Why?

1.  My servers are low volume
2.  I've never had problems with bots eating up smtpds
3.  I reject in smtpd w/3 dnsbls and 3 rhsbls and this has worked great

I'll make an educated guess that many folks here have configured
postscreen simply because it was/is "the new thing", without considering
whether they -needed- it or not.  Many have run into the same address
based whitelisting problem mentioned here, and either ditched
postscreen, or spent hours/days trying to tweak it just right.

My advice is to avoid postscreen unless bots are eating up your smtpds.
 If they're not, and your current setup works well, you gain little, or
nothing, by using postscreen, but for headaches integrating it.

--
Stan

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to