Am 14.02.2015 um 23:37 schrieb LuKreme:
On 14 Feb 2015, at 04:39 , li...@rhsoft.net wrote:
Am 14.02.2015 um 11:30 schrieb LuKreme:
Has anyone had any sort of issue with a check like this:

/(unknown|localhost|localdomain|lan|home|example|local|lokal)$/ REJECT 
Mailserver name in private namespace

I’ve noticed a lot of commercial non-spam email hitting this recently (for 
example, landmarktheatres ticket confirmations, a local restaurant's email 
verification for signup, and some others along those lines). In fact, the split 
between obvious spam and no-spam seems to be about 80/20 with low hitrate 
either way.

Yes, I know their mail servers are mis-configured

put any PTR and HELO checks at the *bottom* of your restrictions and conigure 
the SPF check as well as much as possible DNSWL to skip them

Hmm. I usually put cheap checks first

me too, hence that all comes before milters

Reading on SPF in postfix I see:

http://www.postfix.org/SMTPD_ACCESS_README.html
The greylisting and SPF policies are implemented externally,

Which I thought was no longer true.

# postconf -d | grep spf
spf_explanation =
spf_global_whitelist = no
spf_local_policy =
spf_mark_only = no
spf_patch_version = 1.1.0
spf_received_header = yes
spf_reject_code = 550
spf_reject_dsn = 5.7.1

that's a *not offical* postfix with discouraged pacthes

I haven’t setup SPF in postfix, but those are the default setting.
Searching postfix.org site for spf_local_policy returns no hits so I’ve
not found the documentation on these settings. It may be on my computer.

because it is not part of postfix as said above

hence no real problems here while we update the checks automatically once per 
day by the current http://data.iana.org/TLD/tlds-alpha-by-domain.txt to not 
miss new TLD's and jeject any non-existing

Well, .local is definitely a non-existing tld, and any mail server using that 
as it’s helo is badly broken. It used to be a 100% spam indicator for me, but 
now it is less so.

that is all true but the problem is when some ordinary user sends business mail to a ordinary user on my side and we reject i get called and so i prefer to not need contacting every admin of a badly configured server - they are too much :-)

frankly i have even a "/^localhost\.localdomain$/ DUNNO" on top for exactly the same reason

/etc/python-policyd-spf/policyd-spf.conf

Ah, I will ook at installing that package. Thanks

that's my full config

HELO_reject is disabled by intention after a false positive on the first day with the new system which was a order confirmation with a donwload-link, the default rejects even HELO-softfail

cat /etc/python-policyd-spf/policyd-spf.conf
debugLevel = 1
defaultSeedOnly = 1
HELO_reject = No_Check
Mail_From_reject = Fail
Mail_From_pass_restriction = OK
PermError_reject = False
TempError_Defer = True

Reply via email to