On 13 February 2018 at 08:42, Voytek <li...@sbt.net.au> wrote:

> one of the users is waiting for an email from server currently listed on
> http://www.dnsbl.manitu.net/lookup.php?value=203.12.160.162
>
> chances are it might get fixed in 12 hours, or, maybe not
>
> short of removing dnsbl.manitu.net from my RBL checks, is there a way to
> 'bypass' this current predicament, and, allow mails from the IP/host?
>
> can I simply put IP ? hostname ? both ? in /etc/postfix/client_checks ?
>
> or is it /etc/postfix/sender_checks ? as so:
>
> 203.12.160.162 OK
> mail12.tpgi.com.au OK
>
>
> from main.cf:
> --
> smtpd_recipient_restrictions =
>  reject_unknown_sender_domain,
>  reject_unknown_recipient_domain,
>  reject_non_fqdn_sender,
>  reject_non_fqdn_recipient,
>  reject_unlisted_recipient,
>  check_policy_service inet:127.0.0.1:7777,
>  permit_mynetworks,
>  check_sasl_access hash:/etc/postfix/sasl_access
>  permit_sasl_authenticated,
>  reject_unauth_destination,
>  check_recipient_access hash:/etc/postfix/recipient_no_checks,
>  check_recipient_access pcre:/etc/postfix/recipient_checks.pcre,
>  check_helo_access hash:/etc/postfix/helo_checks,
>  check_sender_access hash:/etc/postfix/sender_checks,   <====??
>  check_client_access hash:/etc/postfix/client_checks,   <=====??
>  check_client_access pcre:/etc/postfix/client_checks.pcre,
>  reject_rbl_client zen.spamhaus.org,
>  reject_rhsbl_client dbl.spamhaus.org,
>  reject_rhsbl_sender dbl.spamhaus.org,
>  reject_rbl_client psbl.surriel.com,
>  reject_rbl_client ix.dnsbl.manitu.net,
>  reject_rbl_client bl.spamcop.net,
>  check_policy_service inet:127.0.0.1:10031
>
>
> -----------
> Feb 13 15:11:59 emu postfix/smtpd[12324]: NOQUEUE: reject: RCPT from
> mail12.tpgi.com.au[203.12.160.162]: 554 5.7.1 Service unavailable; Client
> host [203.12.160.162] blocked using ix.dnsbl.manitu.net; Your e-mail
> service was detected by spam.over.port25.me (NiX Spam) as spamming at Tue,
> 13 Feb 2018 00:10:11 +0100. Your admin should visit
> http://www.dnsbl.manitu.net/lookup.php?value=203.12.160.162;
> from=<ju...@dom.tld.au> to=<s...@dom2.tld> proto=ESMTP
> helo=<
> ​​
> mail12
> ​​
> .tpgi.com.au <http://mail12.tpgi.com.au>>


For use within restriction list(s):
check_client_access is for checking the purported address, or the ip, of
the incoming connecting client
check_sender_access is for checking the MAILFROM address (envelope sender)
check_helo_access is for checking the HELO/EHLO response name

For use outside restriction list(s): (hence later/slower)
header_checks can be used for checking email headers - including the
'From:' header address (which may well be different to the MAILFROM
address).

In your case you can put either the ip or the client address onto a new
line in the file referenced by check_client_access, followed by ' OK', and
then postmap it afterwards. You might want to add ​tpgi.com.au rather
than ​mail12​​.tpgi.com.au (assuming smtpd_access_maps  is  listed  in
parent_domain_matches_subdomains, which is the default case).

Yes it is a little confusing at first...

Reply via email to