Am 02.09.2014 um 20:23 schrieb Wietse Venema:
> li...@rhsoft.net:
>> http://postfix.1071664.n5.nabble.com/postscreen-deep-protocol-tests-without-mail-delays-td20114.html
>>
>> i found that remembering the original discussion but seems i am
>> blind today - how do i tell postscreen to use "deep protocol tests"
>> only on 192.168.196.2 but not for connections coming to the primary
>> IP 192.168.196.1 of that machine?
> 
> As documented, postscreen does not implement specific controls to
> turn specific tests on/off for specific clients. You can whitelist
> 192.168.196.1 with the global postscreen_access_list.

i refer to
http://postfix.1071664.n5.nabble.com/postscreen-deep-protocol-tests-without-mail-delays-td20114.html

* i can't find how to enable "deep protocol tests" at all
  in the the docs while it is mentioned often
  http://www.postfix.org/POSTSCREEN_README.html#after_220 explains
  what it does and that it is disabled by default but not how
  to enable it

* i had not much luck with "postscreen_access_list" and ended
  with add the monitoring ip to "mynetworks" to solve that issue

could you post an example configuration for "postscreen deep protocol tests 
without
mail delays" and enforce "deep protocol tests" only for 192.168.196.2 without at
the same time disable the default protocol tests on the first IP and so also
implicitly disable "postscreen_greet_action = enforce" on it for bots not
coming through the primary MX
__________________________________________

another idea to use the backup-MX as trap would be
postscreen_whitelist_interfaces = !168.100.189.2, static:all

so no client ever makes it to smtpd on that IP and since
both are the same machine no legit client ever should
connect to the backup-MX

Reply via email to