>For the first time in ages, we just got a call from someone who cannot send
>us email. His emails keep getting rejected by our IMGate. Did a grep for
>[EMAIL PROTECTED] and found three entries in my log:
>...554 Client host rejected: cannot find your hostname, [65.54.247.110];
>All 3 ips have no reverse DNS.
yep, that Class C seems pretty undone:
# dig -x 65.54.247.110 @dns.cp.msft.net.
; <<>> DiG 8.3 <<>> -x @dns.cp.msft.net.
; (1 server found)
;; res options: init recurs defnam dnsrch
;; got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUERY SECTION:
;; 110.247.54.65.in-addr.arpa, type = ANY, class = IN
;; AUTHORITY SECTION:
247.54.65.in-addr.arpa. 1D IN SOA dns.cp.msft.net. msnhst.microsoft.com. (
2004041401 ; serial
30M ; refresh
15M ; retry
4W ; expiry
1H ) ; minimum
>(I also checked the logs for the past 3 days, and this is the first valid
>hotmail.com user! All the rest were zombies and spam!)
yep, typical
>Other than adding the ips to mta_clients_bw.map, what can I do to let valid
>hotmail servers through?
that PTR + A check is done in mta_clients_bogus.map. you could remove
hotmail from that file.
but whitelisting the MS-screwed up Class will probably let a lot of spam
from those IPs in.
Len
>
>
> >From my main.cf:
>
>smtpd_recipient_restrictions =
> reject_unauth_pipelining,
> reject_non_fqdn_sender,
> reject_non_fqdn_recipient,
> reject_unknown_recipient_domain,
> permit_mynetworks,
> hash:/etc/postfix/to_recipients_bw.map,
> reject_unauth_destination,
> check_client_access hash:/etc/postfix/mta_clients_bw.map,
> reject_unknown_sender_domain,
> check_sender_access hash:/etc/postfix/from_senders_bw.map,
> check_helo_access hash:/etc/postfix/helo_hostnames.map,
> check_sender_access hash:/etc/postfix/from_senders_clueless.map,
> check_sender_access hash:/etc/postfix/from_senders_bogus.map,
> check_sender_access hash:/etc/postfix/from_senders_mybogus.map,
> reject_rbl_client cbl.abuseat.org,
> reject_rbl_client dnsbl.njabl.org,
> reject_rbl_client relays.ordb.org,
> reject_rbl_client dynablock.wirehub.net,
> reject_rbl_client sbl.spamhaus.org,
> reject_rbl_client opm.blitzed.org,
> check_sender_access hash:/tmp/from_senders_slet.map,
> reject_unverified_sender,
> permit