Thanks for your comments

I am currently trying

postscreen_cache_retention_time = 1d
postscreen_non_smtp_command_ttl = 1d
postscreen_bare_newline_ttl = 1d
postscreen_pipelining_ttl  = 1d

FWIW I am also using the "deep protocol tests as a form of grey-listing

Allen C

On 23/08/17 13:24, Wietse Venema wrote:
> Allen Coates:
>> Is there any way of reducing the TTL of the postscreen temporary whitelist?
> 
> As of Postfix 3.1, these are the defaults:
> 
> postscreen_bare_newline_ttl = 30d
> postscreen_dnsbl_max_ttl = 
> ${postscreen_dnsbl_ttl?{$postscreen_dnsbl_ttl}:{1}}h
> postscreen_dnsbl_min_ttl = 60s
> postscreen_greet_ttl = 1d
> postscreen_non_smtp_command_ttl = 30d
> postscreen_pipelining_ttl = 30d
> 
> Earlier versions have postscreen_dnsbl_ttl instead of 
> postscreen_dnsbl_max_ttl,
> and they don't have postscreen_dnsbl_min_ttl.
> 
>> I am having problems with spammers repeatedly getting through postscreen
>> with a "PASS OLD" result.
>>
>> While I can't stop them trying, at least I can cost them time by making
>> them run the full postscreen gauntlet more frequently...
> 
> The postscreen_dnsbl(_max)_ttl setting should fix that.
> 
>       Wietse
> 

Reply via email to