> On 14 July 2021, at 06:12, Wietse Venema <[email protected]> wrote:
>
> Doug Hardie:
>>
>>> On 12 July 2021, at 18:27, Wietse Venema <[email protected]> wrote:
>>>
>>> Doug Hardie:
>>>> I have a postfix server that uses postscreen. However, occasionally
>>>> a needed mail is blocked by one of the spam services. Is there a
>>>> way to bypass postscreen for just one or more specific addresses
>>>> for a short time?
>>>
>>> http://www.postfix.org/postconf.5.html#postscreen_access_list
>>> http://www.postfix.org/POSTSCREEN_README.html#quick
>>>
>>
>> I went through those earlier. I have configured:
>>
>> postscreen_access_list = permit_mynetworks,
>> cidr:/usr/local/etc/postfix/access.cidr
>
> You also need to set postscreen_denylist_action (or
> postscreen_blacklist_action).
>
> Wietse
Perhaps I am a bit confused. The web page says:
To use the postscreen(8) service to block mail, edit main.cf and specify one or
more of:
• "postscreen_dnsbl_action = enforce", to reject clients that are on
DNS blocklists, and to log the helo/sender/recipient information. With good
DNSBLs this reduces the amount of load on Postfix SMTP servers dramatically.
• "postscreen_greet_action = enforce", to reject clients that talk
before their turn, and to log the helo/sender/recipient information. This stops
over half of all known-to-be illegitimate connections to Wietse's mail server.
It is backup protection for zombies that haven't yet been denylisted.
I have both of those set to enforce. Here is the complete postscreen section
of main.cf:
# postscreen spam filtering
postscreen_greet_action = enforce
postscreen_dnsbl_action = enforce
postscreen_dnsbl_sites = bl.spamcop.net zen.spamhaus.org b.barracudacentral.org
postscreen_access_list = permit_mynetworks,
cidr:/usr/local/etc/postfix/access.cidr
#
That seems to work as I see numerous spam being blocked by those dnsbl sites.
Am I missing something?
-- Doug