CBL:
> > Instead, use postscreen. It blocks clients before they are allowed
> > to talk to a Postfix SMTP server.
> >
> > /etc/postfix/main.cf:
> >     postscreen_greet_action = enforce
> >     postscreen_dnsbl_action = enforce
> >     postscreen_dnsbl_sites = ...your DNSBL server here...
> >
> > You can use rbldnsd to run your own DNSBL server.
> >
> 
> Any easy way of expiring individual entries in the postscreen cache? My
> concern is if I add the SASL abuser to a custom DNSBL after they've already
> been checked by postscreen from the original attempt(s), it'd still "PASS
> OLD" them until their entry in the cache expires.

postscreen_dnsbl_ttl = 60s

        Wietse

Reply via email to