On Freitag, 23. Juni 2006 20:55 Noel Jones wrote:
> add to your other rbl restrictions in postfix:
>    reject_rhsbl_sender dob.sibl.support-intelligence.net

Yes, but it can of course only check the sender (MAIL FROM) of the 
e-mail. This can be forged to be anything, and then within the mail is 
the spammy text with a link to some site which is <5 days old. And this 
cannot be caught with this.
I'll give it a try and implement it, to see if there are any hits with 
MAIL FROM and <5days old domains.

> You can use the "rbl_reply_maps" feature to tell postfix to 454 defer
> this mail rather than 554 reject it.  See docs or postfix-users list
> for details.

OK, I X-post now to postfix-users, because this part belongs there.

When I use rbl_reply_maps, I would have to specify like this?
black.list.name            5xx
other.black.list             4xx

or with the return text, like
black.list.name         $rbl_code Service unavailable blabla

And would I have to specify all RBLs, or only the ones where I don't 
want the default response, but a custom one?

mfg zmi
-- 
// Michael Monnerie, Ing.BSc    -----      http://it-management.at
// Tel: 0660/4156531                          .network.your.ideas.
// PGP Key:        "curl -s http://zmi.at/zmi3.asc | gpg --import"
// Fingerprint: 44A3 C1EC B71E C71A B4C2  9AA6 C818 847C 55CB A4EE
// Keyserver: www.keyserver.net                 Key-ID: 0x55CBA4EE

Attachment: pgp3Aq56l91WR.pgp
Description: PGP signature

Reply via email to