Подскажите пожалуйста как сделать исключения для reject_rbl_client.
При отсылке почты по SMTP с офиса получаю:
Server: 'mail.etorg.com', Protocol: SMTP, Server Response: '554 5.7.1 Service unavailable; Client host [91.90.15.36] blocked using zen.spamhaus.org; http://www.spamhaus.org/query/bl?ip=91.90.15.36'
Если закоментировать rblы слишком много спама начинает идти - не выход.
Причём айпи этот почти во всех листах. В тех где нет спам почти не режут.
Подскажите пожалуйста можно ли добваить 91.90.15.36 в исключения и как именно.smtpd_recipient_restrictions =
reject_unauth_pipelining,
reject_non_fqdn_sender,
reject_non_fqdn_recipient,
reject_unknown_sender_domain,
reject_unknown_recipient_domain,
reject_unlisted_recipient,
permit_mynetworks,
# check_sender_access hash:/usr/local/etc/postfix/access,
# reject_spf_invalid_sender,
# reject_non_fqdn_hostname,
reject_invalid_hostname,
# reject_unauth_destination,
check_recipient_access mysql:/usr/local/etc/postfix/sql/mysql_access_maps.cf,
check_sender_access mysql:/usr/local/etc/postfix/sql/mysql_access_maps.cf,
check_policy_service unix:private/spfpolicy,
reject_rbl_client zen.spamhaus.org,
reject_rbl_client bl.spamcop.net,
# reject_rbl_client dnsbl.njabl.org,
# reject_rbl_client bhnc.njabl.org,
reject_rbl_client cbl.abuseat.org,
# reject_rbl_client list.dsbl.org,
# check_policy_service inet:127.0.0.1:10023,
permit_auth_destination,
permit_sasl_authenticated,
reject
smtpd_sender_restrictions =
check_sender_access mysql:/usr/local/etc/postfix/sql/mysql_access_maps.cf
permit_mynetworks,
# reject_unknown_client,
reject_unknown_address,
reject_unknown_sender_domain
permit
# reject
smtpd_client_restrictions =
check_client_access mysql:/usr/local/etc/postfix/sql/mysql_access_maps.cf
permit_mynetworks,
check_recipient_access hash:$config_directory/skipcheck,
# reject_unknown_client,
permit
# reject
smtpd_data_restrictions =
reject_unauth_pipelining,
permit
#ANTI SPAM
smtpd_delay_reject = yes
smtpd_helo_required = yes
disable_vrfy_command = yes
smtpd_helo_restrictions =
permit_mynetworks,
# check_recipient_access hash:$config_directory/skipcheck,
# check_helo_access hash:/usr/local/etc/postfix/helo_access,
warn_if_reject,
# reject_non_fqdn_hostname,
# reject_unknown_hostname,
# reject_invalid_hostname,
reject_unknown_client,
permit