You could create an "ipset" [1] based on your blacklist. Then you'd use a 
single "iptables" [2] rule to block all traffic from ipset "MyBlacklist" to 
port 25 (or multiple ports or any port).
This way attacker traffic can't reach the port of Postfix, even without 
annoying Postfix with them at all.
You can decide whether you want to actively REJECT the TCP connections from 
blacklist hosts or if you want your system to silently discard their traffic as 
if your host was offline (DROP).

If your blacklist changes from time to time, you could update your ipset using 
a shell script / cron job.

Example help pages:

[1]: https://wiki.archlinux.org/title/Ipset
[2]: https://wiki.archlinux.org/title/Iptables

Reply via email to