On 6 Jun 2016, at 13:39, Yuval Levy wrote:

Thanks for the help, Bill.

On 16-06-06 10:24 AM, Bill Cole wrote:

NOTE THAT 454 REPLY!

could it be because I have soft_bounce = yes while trying to understand
the outcome of my rules without losing incoming emails?

Yes, I believe that would do it. I had somehow forgotten that soft_bounce existed...
[...]

modified package of Postfix

plain vanilla Ubuntu repository.

So, the Debian variant I'd guess... I don't know how far from the canonical distribution that is now, but at one point it included both default config and source differences that made it behave differently from Postfix built from the unmodified source distribution.

1. Stop inviting spammers to come back later when their DNSBL listing
has expired. Fix whatever is causing you to send a 454 reply instead of
the default 554 for Zen listings.

Assuming it is soft_bounce = yes, is there a way to override it for Zen
listings?

None that I am aware of. My understanding of it that it is intentionally global and absolute when set to 'yes' although there are also some less-global *_soft_bounce switches that only apply to particular subsets of would-be hard failures.

Or any other way to be more fine grained about soft bouncing?

A rbl_reply_maps table can be used to give each DNSBL its own reply, including the reply code. I do not think that will override soft_bounce.

2. Stop accepting mail AT ALL from IPs that have no PTR records by
adding reject_unknown_reverse_client_hostname to
smtpd_recipient_restrictions AFTER  permit_mynetworks and
permit_sasl_authenticated. reject_unknown_reverse_client_hostname is
extremely safe, requires no additional DNS lookups, and stops a
substantial amount of spam.

Added, thanks.

Postconf -n is attached.  I am sure that there is a lot to criticize /
improve.  This personal, low-usage Postfix instance has served me well
for ages. Last time I changed configuration was to add greylisting with
Postgray, seven years ago.  I was forced to make changes recently
because my wife's university made the (in my view bad) decision to
switch to outlook.office365.com which does not play nicely with
greylisting.  So I am trying to learn about current spam protection to
keep this personal server going.  Any hint/help is much appreciated.

Just one broad bit of advice: use postscreen.

I assume you don't have it set up, since I see no postscreen_* config in that output and postscreen is mostly useless and harmless with its default settings. Also, it didn't exist 7 years ago.

The best thing postscreen does for me is drop the "fast-talker" spambots that don't wait for a complete greeting banner before sending commands. It also offers a more nuanced approach to DNSBL setup, summing up locally-chosen scores for each list and judging the result against a threshold instead of letting each list make an absolute yes/no decision. See the recent thread "RBLs in postscreen AND smtpd_*_restrictions" for discussion of how this can work along with the traditional mechanism.


Reply via email to