More postfix spam blocking and Whitelisting….



I almost forgot to pass along a link to a more comprehensive detailing of postfix’s anti-uce controls…. here. Also, in the last article I briefly mentioned whitelisting. IF you intend to have several blacklists active it will pay to learn how to whitelist before you HAVE to. To do so, I simply created a text file at /etc/postfix/whitelist and int hat file you enter IP address or hostname followed by OK…. like this….

1.2.3.4 OK
goodmachine.com OK

But… of course, there’s a bit more.


Since I’m using smtpd_client_restrictions for the blacklist lookups, I’m adding in the search for the whitelist there….

smtpd_client_restrictions = check_client_access hash:/etc/postfix/whitelist

You also need to postmap that file after any changes…

postmap /etc/postfix/whitelist

I’ve also been in the habit of reloading postfix after a change like that (although I don’t know that it’s necessary.)

/etc/init.d/postfix reload

It should be noted that the rules of who accesses your server in smtpd_client_restrictions and the other restriction checks are important to be considered as occuring in the order listed. In other words, it matters whether something comes first or last in the list. For instance… if a host is in an ACCEPT rule before they are in a REJECT list they will be accepted, also… if they are in the matching REJECT rule before the ACCEPT rule is found they will be rejected.

Related Posts

Blog Traffic Exchange Related Posts
  • Hiding malware may evade antivirus Sans had an interesting malware analysis this morning about a blob that appeared to be ascii text (gibberish) that was retrieved by a piece of malware. It turns out that the ascii text was a cleverly encoded exe file (windows executable or program file.) It took several iterations of their......
  • How to Remove APCDefender | How to Remove SysProtector | How to Remove InSysSecure | How to Remove SysDefenders It looks like we've been awash in variants of the wini family lately so I'm combining three of the latest rogue antivirus applications in that family into one post. This post will talk about removing APCDefender, removing Sysprotector and Removing InSysSecure and removing SysDefenders. Some of the same steps would......
  • /bash/rm: argument list too long I can't tell you how many times I've seen this complaint from the bash shell when trying to remove a bunch of files. In this case, I was trying to clear a directory where log rotating had run amuck and there was a 10 second lag in typing ls ∗.gz......
Blog Traffic Exchange Related Websites
  • Mountain Biking Basics Trail cycling is a great way to explore the outdoors, stay fit, or simply have fun. Racing down the side of a mountain is a large amount of fun indeed, though it may also be quite dangerous. Although it's dangerous, if you ride with caution, it can be enjoyed by......
  • How to make Strong Passwords Following are the rules and guidelines that may help you in creating a strong password that is secure. These are the things that I’ve used over years based on my own interest in the area of keeping passwords safe and secure. I. Two essential password rules: Following two rules are......
  • Tips for Investing Online The concept of doing your investing online through the use of an online web portal has truly revolutionized everything that financial trading is all about, especially in stock exchanges and in the FOREX market. Availability of resources like quick internet connectivity and portable laptop computers has made it even simpler......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site