So I have Postfix set up as my external mail server. It receives all mail, scans for spam using rbl, header, and body_checks.
Fairly successfully. For our 70 users, we block about 10K per month. However, I am getting some false positives. Rather, I have legitimate people sending mail through blacklisted servers.
I read that main.cf is read ordinally when checking incoming messages, so I have the following in my main.cf:
smtpd_client_restrictions = permit_mynetworks, hash:/etc/postfix/access, reject_maps_rbl, reject_unauth_pipelining
smtpd_helo_restrictions = permit_mynetworks, hash:/etc/postfix/access, permit_naked_ip_address, reject_invalid_hostname, reject_unauth_pipelining
smtpd_sender_restrictions = permit_mynetworks, hash:/etc/postfix/access, reject_unknown_sender_domain, reject_non_fqdn_sender, reject_unauth_pipelining
smtpd_recipient_restrictions = permit_mynetworks, permit_mx_backup, hash:/etc/postfix/access, reject_unknown_recipient_domain, reject_unauth_destination, $
maps_rbl_domains = bl.spamcop.net, relays.ordb.org, cbl.abuseat.org
mime_header_checks = regexp:/etc/postfix/mime_header_checks
header_checks = regexp:/etc/postfix/header_checks
now access is above the rbl checks, yet when I include someone in access by
domain.com OK or user@domain.com OK their mail is still bounced.
and I am supposed to postmap access correct?
4 reported false positives out of 10K is awesome, but it is irritating the President of our little company. Therefore, the IT guy, namely me, gets the oft furrowed brow pointed at me...
Ideas? Suggestions? :Let me know if I have been to vague or if more information is needed. Oh, I am still using 1.1.11-5 (I know, but it works so well)
Fairly successfully. For our 70 users, we block about 10K per month. However, I am getting some false positives. Rather, I have legitimate people sending mail through blacklisted servers.
I read that main.cf is read ordinally when checking incoming messages, so I have the following in my main.cf:
smtpd_client_restrictions = permit_mynetworks, hash:/etc/postfix/access, reject_maps_rbl, reject_unauth_pipelining
smtpd_helo_restrictions = permit_mynetworks, hash:/etc/postfix/access, permit_naked_ip_address, reject_invalid_hostname, reject_unauth_pipelining
smtpd_sender_restrictions = permit_mynetworks, hash:/etc/postfix/access, reject_unknown_sender_domain, reject_non_fqdn_sender, reject_unauth_pipelining
smtpd_recipient_restrictions = permit_mynetworks, permit_mx_backup, hash:/etc/postfix/access, reject_unknown_recipient_domain, reject_unauth_destination, $
maps_rbl_domains = bl.spamcop.net, relays.ordb.org, cbl.abuseat.org
mime_header_checks = regexp:/etc/postfix/mime_header_checks
header_checks = regexp:/etc/postfix/header_checks
now access is above the rbl checks, yet when I include someone in access by
domain.com OK or user@domain.com OK their mail is still bounced.
and I am supposed to postmap access correct?
4 reported false positives out of 10K is awesome, but it is irritating the President of our little company. Therefore, the IT guy, namely me, gets the oft furrowed brow pointed at me...
Ideas? Suggestions? :Let me know if I have been to vague or if more information is needed. Oh, I am still using 1.1.11-5 (I know, but it works so well)