Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-06 Thread Mayhem
Dominic Raferd wrote > Have you considered using abuseipdb? It provides mechanisms (including > via fail2ban) for uploading bad ips as well as for downloading, so you > might be helping the rest of us too. I download their list 3x per day > and apply it to incoming mail before any DNSBL lookups. It

Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-05 Thread Mayhem
LuKreme wrote > On 05 Mar 2019, at 10:00, Dominic Raferd < > dominic@.co > > wrote: >> Fail2ban is (as you know) a way to tackle it. > At 1000 connections a day I don’t think fail2ban or sshguard or whatever > is going to save you anything at all. Oh, I was getting a lot more than 1000 per day -

Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-05 Thread Mayhem
Dominic Raferd wrote > Do you have reason to think your system > is suffering heavy load as a result, or are you concerned that some of > the DNSBLs might block you for reaching commercial-use levels of > lookups? No, but the problem seems to be getting worse this past year, and I was looking for

Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-05 Thread Mayhem
The reason why I even suggested this is that I don't see a lot different IP addresses. I figured the Postfix system wouldn't need to cache that many "bad" IP addresses. You guys obviously see differently. My mail logs rotate at 12AM every night, this is just one IP address in 8.5 hours : $ more /

Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-04 Thread Mayhem
The spam bots are not that short-lived though. I see the same IP's for weeks on end. It's unfortunate that there are no internal options available to handle this issue, so I will rely on fail2ban to blacklist the offenders that fail the DNSBL checks. Thank you for your time. Wietse Venema wrote

Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-03 Thread Mayhem
I was under the impression that Postscreen kept a cache of the IP addresses that failed Pregreet / DNSBL tests.Then it would use those cached results to drop clients immediately based on that previously cached results / expire time. What is throwing me off is this : postscreen_dnsbl_max_ttl : Th

Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-03 Thread Mayhem
Could someone update the manual for clarification then? The manual suggests the connection will close immediately - and that's it. As is stands now, it makes no mention that it will "Allow other tests to complete" first. ignore : Ignore the failure of this test. Allow other tests to complete. en

Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-03 Thread Mayhem
No, the manual states "Drop the connection immediately with a 521 SMTP reply" and that's not happening. The 521 drop comes *after* the pregreet and DNSBL checks. Mar 3 09:59:54 localhost postfix/dnsblog[84376]: addr 85.54.217.239 listed by domain zen.spamhaus.org as 127.0.0.11 Mar 3 09:59:54 lo

Re: postscreen_dnsbl_action "drop" not working correctly?

2019-03-03 Thread Mayhem
The 521 SMTP reply only happens after checking the block lists. It's not being dropped immediately like the manually says it should be. - Mar 3 09:59:54 localhost postfix/postscreen[84375]: CONNECT from [85.54.217.239]:5089 to [xx.xx.xx.xx]:25 Mar 3 09:59:54 localhost postfix/postscreen[843

postscreen_dnsbl_action "drop" not working correctly?

2019-03-03 Thread Mayhem
It doesn't appear that postscreen_dnsbl_action is working correctly when set to "drop". The manual states "Drop the connection immediately with a 521 SMTP reply" - but that's not happening. It's still checking the block lists. Mar 3 08:03:50 localhost postfix/postscreen[80179]: CONNECT from [185