Re: RBL problems with smarthost on private address range

From: Jim Potter (no email)
Date: Wed May 07 2008 - 05:25:42 EDT

  • Next message: Geert Batsleer: "Re: Backscatting filter?"

    Hi Ralf,

    Doesnt the bit you've suggested below just say that if it's been
    forwarded through 10.4.20.10 then allow it, so it never gets checked by
    any rbl, dspam etc??
    (Mail gets onto our server by only 2 routes - from my_networks or via
    10.4.20.10)

    cheers

    Jim

    > smtpd_recipient_restrictions =
    > permit_mynetworks, reject_non_fqdn_sender,
    > reject_unknown_recipient_domain, reject_unauth_pipelining,
    > reject_non_fqdn_recipient, permit_sasl_authenticated,
    > reject_unauth_destination,
    >

        *

          

    > reject_rbl_client list.dsbl.org,
    > reject_rbl_client opm.blitzed.org,
    > reject_rbl_client dnsbl.njabl.org,
    > reject_rbl_client blackholes.wirehub.net,
    > reject_rbl_client list.dsbl.org,
    > reject_rbl_client sbl-xbl.spamhaus.org,
    > check_client_access pcre:/etc/postfix/dspam_filter_access
    >

        These of course check 10.20.4.10 against all the RBLs
        Solution: Simply add:
        check_client_access hash:/etc/postfix/my_relayhost
        with
        10.20.4.10 OK
        where I put the *

    -- 
    This message has been scanned for viruses and
    dangerous content by MailScanner, and is
    believed to be clean.
    

  • Next message: Geert Batsleer: "Re: Backscatting filter?"





    Hosted Email Solutions

    Invaluement Anti-Spam DNSBLs



    Powered By FreeBSD   Powered By FreeBSD