Wietse Venema: > Does the following address the problem? This fixes the responses for: > > check_reverse_client_hostname_access > check_reverse_client_hostname_a_access > check_reverse_client_hostname_mx_access > check_reverse_client_hostname_ns_access > > Basically, with all SMTP server responses of the form > > 5XX 5.X.X <stuff>: Unverified Client host rejected: .... > > the stuff should contain the unverified client hostname, not the > verified client hostname (which may be "unknown") and IP address. > > Wietse
This patch is for Postfix 2.11, 2.10, 2.9, 2.8 and perhaps earlier. Wietse --- ./smtpd_check.c.orig 2013-11-12 13:00:11.000000000 -0500 +++ ./smtpd_check.c 2014-09-20 20:34:20.000000000 -0400 @@ -3844,7 +3844,7 @@ SMTPD_NAME_CLIENT, def_acl); } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_ACL, &cpp)) { status = check_namadr_access(state, *cpp, state->reverse_name, state->addr, - FULL, &found, state->namaddr, + FULL, &found, state->reverse_name, SMTPD_NAME_REV_CLIENT, def_acl); forbid_whitelist(state, name, status, state->reverse_name); } else if (strcasecmp(name, REJECT_MAPS_RBL) == 0) { @@ -3927,14 +3927,14 @@ } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_NS_ACL, &cpp)) { if (strcasecmp(state->reverse_name, "unknown") != 0) { status = check_server_access(state, *cpp, state->reverse_name, - T_NS, state->namaddr, + T_NS, state->reverse_name, SMTPD_NAME_REV_CLIENT, def_acl); forbid_whitelist(state, name, status, state->reverse_name); } } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_MX_ACL, &cpp)) { if (strcasecmp(state->reverse_name, "unknown") != 0) { status = check_server_access(state, *cpp, state->reverse_name, - T_MX, state->namaddr, + T_MX, state->reverse_name, SMTPD_NAME_REV_CLIENT, def_acl); forbid_whitelist(state, name, status, state->reverse_name); }