CBL: > > Instead, use postscreen. It blocks clients before they are allowed > > to talk to a Postfix SMTP server. > > > > /etc/postfix/main.cf: > > postscreen_greet_action = enforce > > postscreen_dnsbl_action = enforce > > postscreen_dnsbl_sites = ...your DNSBL server here... > > > > You can use rbldnsd to run your own DNSBL server. > > > > Any easy way of expiring individual entries in the postscreen cache? My > concern is if I add the SASL abuser to a custom DNSBL after they've already > been checked by postscreen from the original attempt(s), it'd still "PASS > OLD" them until their entry in the cache expires.
postscreen_dnsbl_ttl = 60s Wietse