Ok, thanks Bill. I have postscreen enabled.
master.cf smtp inet n - n - 1 postscreen However, I had the postscreen_access_list setting set to ignore ….. so learning all the time :-) Now to look at pf. Thanks for the excellent tips there. Robert > On 5 Mar 2016, at 00:42, Bill Cole > <postfixlists-070...@billmail.scconsult.com> wrote: > > On 4 Mar 2016, at 9:47, Robert Chalmers wrote: > >> thanks, that seems to work - how to make it permanent next … >> >> but, it should be working in postfix in any case shouldn’t it? >> >> Wep, weekend coming up. >> Robert >> >>> On 4 Mar 2016, at 13:48, L.P.H. van Belle <be...@bazuin.nl> wrote: >>> >>> Very simple, route it to localhost. >>> >>> Like : >>> route add -host 174.46.142.137 127.0.0.1 > > That's really a sloppy fix. It works (until your next reboot) but routing > packets to the loopback interface isn't scalable and ignores other problems > that you clearly have: > > 1. You have a lot of postscreen settings but don't seem to actually have > postscreen enabled, although it may be that you just didn't show the > postscreen log lines. If you do have postscreen actually working, you can use > the postscreen_access_list setting that you already have to blacklist that IP > in the cidr map you seem to intend to be using. > > 2. In reference to this: >> Mac. OSX 10.11 >> Postfix. >> >> I’ve even tried setting it in the firewall - but I’m missing something, >> because there it >> is again... >> >> I have the domain IP in a blacklist on both the pf.conf firewall > > I offer my condolences. Part of why I still run some things (including my > personal Postfix instance) on older MacOS is that the newer and objectively > better pf firewall has persistently confused me and I have all these little > tools for ipfw that work around even the Apple-custom breakages in it. > However, I do have *some* familiarity with pf so I can try to help. > > If you THINK you have the IP blocked by a rule in pf.conf yet clearly do not, > that's a serious problem. Either pf is turned off or there's a rule ordering > problem or something more arcane, but in any case pf isn't doing what you > think it should be doing, and that's never a good thing in a firewall. The > first thing to check is whether you actually have an active pf rule or rules > related to that IP, which you might not. Easy enough to check with the > command: > > pfctl -v -s rules > > That will list your rules with some stats, and near the end of the list > should be something like these: > > block return in log quick inet proto tcp from 174.46.142.137 to any > port = 25 > [ Evaluations: 15858 Packets: 0 Bytes: 0 States: 0 ] > [ Inserted: uid 0 pid 77467 ] > block return in log quick inet proto tcp from 174.46.142.137 to any > port = 465 > [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] > [ Inserted: uid 0 pid 77467 ] > block return in log quick inet proto tcp from 174.46.142.137 to any > port = 587 > [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] > [ Inserted: uid 0 pid 77467 ] > > Which is the three active rules that would be generated by having this at the > end of /etc/pf.conf when it was last reloaded: > > block return in log quick proto tcp from 174.46.142.137 to any port > {25,465,587} > > Your rule may differ in small ways, yet be entirely reasonable. If you have a > rule in pf.conf that doesn't seem to have resulted in one or more in the > active listing, maybe you just forgot to reload: > > pfctl -f /etc/pf.conf > > Or if the rule shows in the active list but isn't working, maybe this will > help: > > pfctl -e > Robert Chalmers rob...@chalmers.com <mailto:rob...@chalmers.com>.au Quantum Radio: http://tinyurl.com/lwwddov Mac mini 6.2 - 2012, Intel Core i7,2.3 GHz, Memory:16 GB. El-Capitan 10.11. XCode 7.2.1 2TB: Drive 0:HGST HTS721010A9E630. Upper bay. Drive 1:ST1000LM024 HN-M101MBB. Lower Bay