> On 14 July 2021, at 06:12, Wietse Venema <wie...@porcupine.org> wrote: > > Doug Hardie: >> >>> On 12 July 2021, at 18:27, Wietse Venema <wie...@porcupine.org> wrote: >>> >>> Doug Hardie: >>>> I have a postfix server that uses postscreen. However, occasionally >>>> a needed mail is blocked by one of the spam services. Is there a >>>> way to bypass postscreen for just one or more specific addresses >>>> for a short time? >>> >>> http://www.postfix.org/postconf.5.html#postscreen_access_list >>> http://www.postfix.org/POSTSCREEN_README.html#quick >>> >> >> I went through those earlier. I have configured: >> >> postscreen_access_list = permit_mynetworks, >> cidr:/usr/local/etc/postfix/access.cidr > > You also need to set postscreen_denylist_action (or > postscreen_blacklist_action). > > Wietse
Perhaps I am a bit confused. The web page says: To use the postscreen(8) service to block mail, edit main.cf and specify one or more of: • "postscreen_dnsbl_action = enforce", to reject clients that are on DNS blocklists, and to log the helo/sender/recipient information. With good DNSBLs this reduces the amount of load on Postfix SMTP servers dramatically. • "postscreen_greet_action = enforce", to reject clients that talk before their turn, and to log the helo/sender/recipient information. This stops over half of all known-to-be illegitimate connections to Wietse's mail server. It is backup protection for zombies that haven't yet been denylisted. I have both of those set to enforce. Here is the complete postscreen section of main.cf: # postscreen spam filtering postscreen_greet_action = enforce postscreen_dnsbl_action = enforce postscreen_dnsbl_sites = bl.spamcop.net zen.spamhaus.org b.barracudacentral.org postscreen_access_list = permit_mynetworks, cidr:/usr/local/etc/postfix/access.cidr # That seems to work as I see numerous spam being blocked by those dnsbl sites. Am I missing something? -- Doug