This is an interesting (to me) approach.  I've tried to use it, but
get the following:
fatal: open database /etc/postfix/helo_access.db: Inappropriate file
type or format

I admit, all I did was copy and slightly modify the above lines to
see what it would do. :)

run "postmap helo_access" this will output the database (it took me
forever to get that one working.)


> Next I added this to my main.cf
>  smtpd_sender_restrictions =
>        permit_sasl_authenticated,
>        permit_mynetworks,
>        reject_non_fqdn_sender,
>        reject_unknown_sender_domain,
>        permit
> Forcing everything to use a fully qualified domain name helped
> eliminate a ton of spam. The next item I did was the last of the light
> weight stuff, this catches almost everything else:
> smtpd_recipient_restrictions =
>        reject_unauth_pipelining,
>        reject_non_fqdn_recipient,
>        reject_unknown_recipient_domain,
>        permit_mynetworks,
>        permit_sasl_authenticated,
>        reject_unauth_destination
>        check_sender_access
>                hash:/etc/postfix/sender_access,
>        check_recipient_access
>                hash:/etc/postfix/recipient_access,
>        check_helo_access
>                hash:/etc/postfix/secondary_mx_access,
>        reject_rbl_client list.dsbl.org
>        reject_rbl_client sbl-xbl.spamhaus.org,
>        permit
>

This is also valuable stuff as well, as there are a few directives
here that I've not seen before.  I wanted to ask about the format of
the sender_access, recipient_access, and secondary_mx_access files to
which you refer above.  Are these basically whitelists? If so, how do
you format the files?

Yeah these files are simply white/blacklists depending on if you use
OK or REJECT.
my.host.com    OK
evil.host.com    REJECT You are evil!

--
Dallin Jones
www.dallinjones.com

/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to