On Tue, Jan 12, 2010 at 03:02:37PM -0500, Frank Cusack wrote:
> My postfix-2.6.5 is rejecting mail from a host which has a large

Not according to what we see below. "Lost connection" does not mean
you rejected them.

> PTR RRset -- 44 entries and large enough to require TCP. 
> host/dig/nslookup actually dumps core on my solaris box (looks like 
> the bug was fixed in BIND just a few months ago).  I don't know for 
> sure that it is the PTR records that are causing the problem 
> because all I get in the log is

Coincidence, I would guess. Possibly tangentially related in that
this site's administrator might have tried something else that's as
silly as the multiple PTRs. :) This is almost surely something at
layer 2 or 3.

> Jan 12 11:14:42 x.y.z postfix/smtpd[29691]: [ID 197553 mail.info]
> connect from unknown[1.2.3.4]
> Jan 12 11:14:42 x.y.z postfix/smtpd[29691]: [ID 197553 mail.info]
> lost connection after CONNECT from unknown[1.2.3.4]
> Jan 12 11:14:42 x.y.z postfix/smtpd[29691]: [ID 197553 mail.info]
> disconnect from unknown[1.2.3.4]
> 
> I'm not sure what part of my postfix config to even look at since 
> the log message is fairly uninformative.  Or more importantly, how 
> to whitelist their MX host.  (I haven't yet reviewed Victor's 
> recent mail on that.)

Whitelisting won't keep the connection from dropping.

> I tried putting then in sender_access but apparently postfix 
> doesn't get that far.  Here are the significant parts of postconf 

You're using sender_access as a check_sender_access lookup (good, the
name and function are related.) However, you would want to use a
check_client_access lookup to whitelist a client. But see above, that
won't address the issue at hand.

> smtpd_data_restrictions = reject_multi_recipient_bounce  permit
> smtpd_helo_required = yes
> smtpd_helo_restrictions = permit_mynetworks
> reject_unauth_pipelining reject_invalid_helo_hostname

reject_unauth_pipelining won't work here, only in
smtpd_data_restrictions

> reject_non_fqdn_helo_hostname

> smtpd_recipient_restrictions = reject_non_fqdn_sender
> reject_unknown_sender_domain  reject_non_fqdn_recipient
> reject_unknown_recipient_domain  permit_mynetworks
> check_sender_access dbm:/etc/postfix/sender_access

check_sender_access looks up the MAIL FROM address (or the domain, or
the localpart), see SMTPD_ACCESS_README.html and access.5.html for
details.

> reject_unauth_destination reject_non_fqdn_hostname 
> reject_invalid_hostname check_sender_mx_access 
> cidr:/etc/postfix/bogus_mx reject_rhsbl_sender
> dsn.rfc-ignorant.org reject_rhsbl_sender bogusmx.rfc-ignorant.org 
> reject_rhsbl_sender zen.spamhaus.org
> reject_rhsbl_sender bl.spamcop.net permit

Zen and spamcop are not RHSBL services. You're bugging them with
queries that will never match anything. I would suggest that you
consider "reject_rbl_client zen.spamhaus.org", however.

Since you munged the name/IP of the peer with which you were having
problems, there's not anything more we can do here.
-- 
    Offlist mail to this address is discarded unless
    "/dev/rob0" or "not-spam" is in Subject: header

Reply via email to