On Mon, Jul 04, 2011 at 04:48:44AM -0700, Charlie Orford wrote:
> unverified_recipient_tempfail_action = permitĀ would have solved
> this problem with the small penalty of a brief period of potential
> backscatter.
>
> Where is the down side?
That "small penalty" sure is a down side. If I would provide backup
service for someone else, I would absolutely insist that the primary
must never reject my mail for that domain. Let THEM be the spammer,
not me.
If you're intent on this, you can implement it yourself with simple
scripts. Best would be a small policy service, but a shell script
running from crontab would suffice.
The cron job would check to see if the primary MX is reachable, and
exit if so. A check_recipient_access lookup for the backup domain
would return "defer" or "defer_if_permit". If the primary MX is not
available, the access map would be changed to return "dunno".
The cron job continues checking availability of the primary MX, and
changes the access map back, and optionally runs "postfix flush",
when the primary MX comes back.
A policy service could do the same thing in real time, without the
possible delay of the cron job interval. It could also flag clients
as likely spammers when they attempt to deliver to the backup domain
while the primary MX is up.
References:
http://www.postfix.org/SMTPD_ACCESS_README.html
http://www.postfix.org/access.5.html
http://www.postfix.org/SMTPD_POLICY_README.html
--
Offlist mail to this address is discarded unless
"/dev/rob0" or "not-spam" is in Subject: header