More postfix spam blocking and Whitelisting….



I almost forgot to pass along a link to a more comprehensive detailing of postfix’s anti-uce controls…. here. Also, in the last article I briefly mentioned whitelisting. IF you intend to have several blacklists active it will pay to learn how to whitelist before you HAVE to. To do so, I simply created a text file at /etc/postfix/whitelist and int hat file you enter IP address or hostname followed by OK…. like this….

1.2.3.4 OK
goodmachine.com OK

But… of course, there’s a bit more.


Since I’m using smtpd_client_restrictions for the blacklist lookups, I’m adding in the search for the whitelist there….

smtpd_client_restrictions = check_client_access hash:/etc/postfix/whitelist

You also need to postmap that file after any changes…

postmap /etc/postfix/whitelist

I’ve also been in the habit of reloading postfix after a change like that (although I don’t know that it’s necessary.)

/etc/init.d/postfix reload

It should be noted that the rules of who accesses your server in smtpd_client_restrictions and the other restriction checks are important to be considered as occuring in the order listed. In other words, it matters whether something comes first or last in the list. For instance… if a host is in an ACCEPT rule before they are in a REJECT list they will be accepted, also… if they are in the matching REJECT rule before the ACCEPT rule is found they will be rejected.

Related Posts

Blog Traffic Exchange Related Posts
  • Moving from Evolution to Konqueror After several weeks of good behaviour from Evolution 2.4 since the Mandriva 2006 upgrade, I started getting a wierd error on sending messages *(Mail From response Error Unknown). Nothing within my settings for Evolution had changed since the night before when things worked... I tested with Kontact and was able......
  • Mandriva 2006 upgrade on Inspiron 8000 laptop saga Part II Well the saga continues. I suspect there will be a three as I get all software installed and mention tips and tweaks. III may not be named as such, I may just do a series of articles on little things that I've changed. At this hour I've got the KDE......
  • Using ssh to protect web browsing over wireless or other hostile networks This really could be used to encyrpt web traffic over any "hostile" network. Here's what I'm talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world......
Blog Traffic Exchange Related Websites
  • Filing Small Claims Court: Basic FAQs What is small claims court? Small claims court is usually for cases involving claims of less than $5,000. A benefit of small claims court is that you do not need a lawyer as it is simplified to expedite cases. What can I do in small claims? There are two type......
  • Snug Harbor Marina, Carlsbad, CA Snug Harbor Marina is located in: Carlsbad, CA Phone: (916) 775-1455 Dock/Slip Rates: The marina management states: Basic rule for covered berth charges: $7.00 per foot (berth length) per month for long term leases. (Over 6 months). Basic rule for Open slips and docks: $6.00 per ft of dock space......
  • How to make Strong Passwords Following are the rules and guidelines that may help you in creating a strong password that is secure. These are the things that I’ve used over years based on my own interest in the area of keeping passwords safe and secure. I. Two essential password rules: Following two rules are......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site