Thanks for your comments
I am currently trying
postscreen_cache_retention_time = 1d
postscreen_non_smtp_command_ttl = 1d
postscreen_bare_newline_ttl = 1d
postscreen_pipelining_ttl = 1d
FWIW I am also using the "deep protocol tests as a form of grey-listing
Allen C
On 23/08/17 13:24, Wietse Venema wrote:
> Allen Coates:
>> Is there any way of reducing the TTL of the postscreen temporary whitelist?
>
> As of Postfix 3.1, these are the defaults:
>
> postscreen_bare_newline_ttl = 30d
> postscreen_dnsbl_max_ttl =
> ${postscreen_dnsbl_ttl?{$postscreen_dnsbl_ttl}:{1}}h
> postscreen_dnsbl_min_ttl = 60s
> postscreen_greet_ttl = 1d
> postscreen_non_smtp_command_ttl = 30d
> postscreen_pipelining_ttl = 30d
>
> Earlier versions have postscreen_dnsbl_ttl instead of
> postscreen_dnsbl_max_ttl,
> and they don't have postscreen_dnsbl_min_ttl.
>
>> I am having problems with spammers repeatedly getting through postscreen
>> with a "PASS OLD" result.
>>
>> While I can't stop them trying, at least I can cost them time by making
>> them run the full postscreen gauntlet more frequently...
>
> The postscreen_dnsbl(_max)_ttl setting should fix that.
>
> Wietse
>