If you look at/implement my tutorial
Frontline spam defense for Mac OS X Server you will see the correct configuration for checking authentication before the RBLs. In addition you will reduce your spam intake significantly.
If you don't want to add anything to your default configuration, make sure that the following parameters in /etc/postfix/main.cf are in the right horizontal order:
smtpd
clientrestrictions = permit_mynetworks, permit
saslauthenticated, reject
rblclient zen.spamhaus.org, permit
smtpd
recipientrestrictions = permit_mynetworks, permit
saslauthenticated, reject
unauthdestination, reject
rblclient zen.spamhaus.org, permit
This will make sure that once authenticated or coming from the internal network, the RBL won't be queried.
-
Furthermore, I would add a separate submission port (587) for your authenticated users only, bypassing the content filter as well. This can be done by adding the following to /etc/postfix/master.cf
submission inet n - n - - smtpd
-o content_filter=
-o smtpd
recipient_restrictions=permit_saslauthenticated,reject
(3 spaces before -o )