Outgoing mail blocked by spamhaus

I am using zen.spamhaus for spam protection and it seems to work great. One problem though... it also check outgoing messages. This is good in that it prevent unauthorized mail from going out, but it is also blocking some of my users, even though they authenticate first (as is required). Is there a way to change this so that authenticated users will not be picked up by spamhaus?

G5, Mac OS X (10.4.11)

Posted on Mar 25, 2008 4:00 AM

Reply
10 replies

Mar 26, 2008 7:24 PM in response to Jin597

This is a common problem if authenticated SMTP messages originate outside your subnet, and the IP block in which the originating address resides has been placed on one or more of the Spamhaus lists. By far the most common reason for block events—in my experience—is the inclusion by Spamhaus of major internet providers on their PBL, or Policy Block List.

Many providers in the US, including Comcast, Qwest and T-Mobile have had net blocks added by to the PBL because Spamhaus believes that these providers do not adequately protect tens of thousands of static IP addresses they control.

This policy is beyond annoying, because…

• only the party controlling the blocked range can seek to remove a record
• finding someone at a provider familiar with the issue and able to act is nearly impossible, and
• Spamhaus is unreachable and entirely uncooperative in any effort to resolve such issues undertaken by an affected third party

This obnoxious behavior had such a deleterious affect on our mobile workforce, that we simply severed our link to Spamhaus. That's regrettable, because they do a great job stopping SPAM traffic. This annoying listing behavior, however, eliminates any possibility that many users can take advantage of their services.

Mar 27, 2008 4:21 AM in response to Michael Lafferty

The problem stems from the fact that many private users have infected PCs which act as spambots, thus making this necessary. It would be unfeasible to list/delist dynamic IPs continously.

That said, the problem is easily circumvented by proper postfix configuration. As long as you make sure authentication is checked before the RBL, you will have no problems whatsoever.

Mar 27, 2008 7:28 AM in response to pterobyte

I feel a little foolish for asking, but there is a dearth of documentation regarding such configuration steps. Can you provide an example of the necessary code strings to add to or modify in the postfix/master.cf or other applicable file to achieve this circumvention for authenticated clients?

We currently use port 25 with SSL enabled and MD5 Challenge-Response. Thanks for the tip!

Mar 27, 2008 8:17 AM in response to Michael Lafferty

If you look at/implement my tutorial Frontline spam defense for Mac OS X Server you will see the correct configuration for checking authentication before the RBLs. In addition you will reduce your spam intake significantly.

If you don't want to add anything to your default configuration, make sure that the following parameters in /etc/postfix/main.cf are in the right horizontal order:

smtpd clientrestrictions = permit_mynetworks, permit saslauthenticated, reject rblclient zen.spamhaus.org, permit

smtpd recipientrestrictions = permit_mynetworks, permit saslauthenticated, reject unauthdestination, reject rblclient zen.spamhaus.org, permit

This will make sure that once authenticated or coming from the internal network, the RBL won't be queried.

-

Furthermore, I would add a separate submission port (587) for your authenticated users only, bypassing the content filter as well. This can be done by adding the following to /etc/postfix/master.cf

submission inet n - n - - smtpd
-o content_filter=
-o smtpd recipient_restrictions=permit_saslauthenticated,reject

(3 spaces before -o )

Apr 1, 2008 2:49 AM in response to pterobyte

Hi there,

Thanks for your valuable input - quick question: Whilst I am "the main administrator" of our machine, I can not rule out that another one or two admins "might" (it should not happen, but it could...) use Server Admin to add users/email addresses - if I follow your guides, and someone does the aforementioned changes through Apple's Server Admin interface, is there a risk something "breaks" completely?

I know it is a vague question, but please see it in the context of my 99.9% certainty that I can make sure I tell them off to touch anything but the "Add user", "Change User Password" and "add email address/alias" 🙂

Once I've got the basics set up, I will definitely consider going for your "test our server" services, sounds like a brilliant idea!

Thanks for all the tutorials, very interesting and useful!
Jonas

Apr 1, 2008 2:53 AM in response to JonasLondon

Jonas,

user setup is done in WGM and not Server Admin and as such poses no risk.

It is Server Admin that has a tendency to mangle configuration files. Makes sure you have a copy of all configuration files (if you use mailbfr for nightly backups, it will take care of this), just in case you need to revert. Most of the time Server Admin does fine, but it is unpredictable.

HTH,
Alex

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Outgoing mail blocked by spamhaus

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.