I'm trying to block mail from zoanmail. Man 5 access stats that hostnames
can be added. See below, what am I doing wrong.

Host/Domain Summary: SMTPD Connections (top 25)
 connections  time conn.  avg./conn.  max. time  host/domain
 -----------  ----------  ----------  ---------  -----------
   1189        4:03:33         12s        43s   zoanmail.com

smtpd_recipient_restrictions =
 hash:/etc/postfix/smtpd_access_maps,
 reject_unauth_pipelining,
 hash:/etc/postfix/to_recipients.map,
 hash:/etc/postfix/to_recipients_bad.map,
 check_client_access hash:/etc/postfix/mta_clients.map,         <<<ADDED
ZOANMAIL TWO DAYS AGO
 check_client_access hash:/etc/postfix/mta_clients_unkn_users.map,
 reject_non_fqdn_recipient,
 reject_non_fqdn_sender,
 reject_unknown_sender_domain,
 reject_unknown_recipient_domain,
 permit_mynetworks,
 reject_unauth_destination,
 check_sender_access hash:/etc/postfix/from_senders.map,
 reject_maps_rbl,
 permit

MTA_CLIENTS.MAP  SNIPPET

zoanmail.com 554 ACL mta_clients


But only get 10 matches.

Mar 19 07:14:37 imgate1 postfix/smtpd[6959]: reject: RCPT from
out-69-24-234-120.zoanmail.com[69.24.234.120]: 554
<out-69-24-234-120.zoanmail.com[69.24.234.120]>: Client host rejected: ACL
mta_clients; from=<[EMAIL PROTECTED]>
to=<[EMAIL PROTECTED]>
imgate1# grep zoanma /var/log/maillog | grep mta_clients | tail | wc -l
      10

However there are much more connections from zoanmail.

imgate1# grep zoanma /var/log/maillog | wc -l
    1950

Andrew P. Kaplan
www.cshore.com

"Education is when we read the fine print.  Experience is what we get if we
don't"  Pete Seeger (Singer/Composer)


Reply via email to