On 22 Oct 2021, at 01:09, Gerben Wierda <gerben.wie...@rna.nl> wrote: > >> >> On 21 Oct 2021, at 14:35, Wietse Venema <wie...@porcupine.org >> <mailto:wie...@porcupine.org>> wrote: >> >> Gerben Wierda: >>> My standard DNS forwards to cloud9 (9.9.9.9) because cloud9 blocks bad >>> actors. But that means that DNSBL from spamhaus doesn?t work as the query >>> to comes from a public DNS server. >>> >>> I am using: >>> # Drop any SMTP client that talks before its turn (spam botnets in a hurry) >>> postscreen_greet_action = drop >>> # Drop any SMTP client that is in the DNSBL >>> postscreen_dnsbl_sites = zen.spamhaus.org <http://zen.spamhaus.org/>*2 >>> postscreen_dnsbl_action = drop >>> >>> I have a secondary resolver that doesn?t forward to cloud9. Can I >>> use that local DNS instead of the standard one in postfix, preferably >>> for postscreen DNSBL only? >> >> Postfix does not choose its DNS resolvers. Instead, Postfix uses >> the libresolv system library. Historically, that library has no API >> to specify resolver IP address(es), and it is unlikely that Postfix >> will implement its own libresolv functionality. >> >> On the wishlist is to have a Postfix resolver *plugin* API, like >> Postfix has the XSASL API for different SASL backends (Cyrus, >> Dovecot). Then, Postfix could call into alternative resolver >> libraries. >> >> Meanwhile could you dnsmasq et al. to manage how queries are routed? > > Actually, the whole question was based on a misunderstanding what was going > wrong. > > In my log I saw this and this was a false positive for DNSBL > > Oct 21 11:15:35 mail smtp/smtpd[41623]: NOQUEUE: reject: RCPT from > mta-222-103.sparkpostmail.com > <http://mta-222-103.sparkpostmail.com/>[147.253.222.103]: 554 5.7.1 Service > unavailable; Client host [147.253.222.103] blocked using zen.spamhaus.org > <http://zen.spamhaus.org/>; Error: open resolver; > https://www.spamhaus.org/returnc/pub/74.63.25.250 > <https://www.spamhaus.org/returnc/pub/74.63.25.250>; > from=<msprvs1=18928J6ijWitt=bounces-1...@sp-mail.networkapp.eu > <mailto:msprvs1=18928J6ijWitt=bounces-1...@sp-mail.networkapp.eu>> > to=<gerben.wie...@rna.nl <mailto:gerben.wie...@rna.nl>> proto=ESMTP > helo=<mta-222-103.sparkpostmail.com <http://mta-222-103.sparkpostmail.com/>> > > I wrongly concluded that this had to do with me using a forwarder in my DNS > resolver setup (unbound forwarding to a public resolver like 9.9.9.9), but it > had nothing to do with that. > > What actually was the case that I had to update my main.cf from > > postscreen_dnsbl_sites = zen.spamhaus.org <http://zen.spamhaus.org/> > > to > > postscreen_dnsbl_sites = zen.spamhaus.org > <http://zen.spamhaus.org/>=127.0.0.[2..11]
And of course, this also holds for: reject_rbl_client zen.spamhaus.org=127.0.0.[2..11], Actually, I have noticed I have both now, smtpd_client_restrictions/reject_rbl_client and postscreen_dnsbl_sites Hmm, if I have the postscreen one, isn’t the smtpd_client_restrictions one superfluous? G > > because spamhaus has added extra answers that are not about the IP checked, > but about DNSBL itself and the query. What still eludes me is why this false > positive was not happening all the time but only now and then. Most of the > time DNSBL worked fine, > > More info: > https://www.spamhaus.org/news/article/807/using-our-public-mirrors-check-your-return-codes-now > > <https://www.spamhaus.org/news/article/807/using-our-public-mirrors-check-your-return-codes-now> > and Using postscreen instead > <https://docs.spamhaus.com/datasets/docs/source/40-real-world-usage/PublicMirrors/MTAs/020-Postfix.html#using-postscreen-instead> > > The examples in the postfix doc might warn for false positives for DNSBL > resolvers that have a wider range of answers, because those require the = > part of the setting. > > G