Bill Cole: > On 31 Oct 2018, at 17:12, Noel Jones wrote: > > > Postscreen *should not* be used on ports used for client > > authenticated SMTP. > > Generally, this has been true... > > However, I have recently seen spambots using compromised accounts on > port 587 without properly waiting for the greeting banner. This was on a > Sendmail installation, which already (inadvertently) had a GreetPause > applied to port 587. > > I intend to experiment with postscreen on 587 on the next Postfix system > I work with where compromised accounts are a problem. I hope that by > then someone else will have pioneered that tactic and worked through all > the pitfalls here.
You would not be able to use many DNSBLs such as zen.spamhaus.org, nor any of the 'after 220' protocol tests. It wouod take a ton of master.cf configuration. master.cf: submission inet .... postscreen -o smtpd_service=submission-smtpd -o postscreen_cache_map=$submission_cache_map -o postscreen_dnsbl_sites=$submission_dnsbl_sites -o postscreen_xxx=$submission_xxx ... submission-smtpd pass ... smtpd -o smtpd_xxxx=$submission_xxxx ... With suitable submission_mumble parameter settings in master.cf. Wietse