tumgreyspf - External policy checker for the postfix mail server
||FreeBSD Ports Latest amd64
Tumgreyspf, an external policy checker for the postfix mail server. It can
optionally greylist and/or use spfquery to check SPF records to determine if
email should be accepted by your server.
Because of its design, legitimate e-mail is never trapped or rejected. Only
spam and viruses are caught. Since adding it to our mail server (which also uses
Spam Assassin, ClamAV, and an outsourced anti-spam system), our spam level has
dropped by an order of magnitude.
It uses the file-system as its database, no additional database is required to
- DOCS: on
# To configure Postfix
Add to your postfix master.cf:
tumgreyspf unix - n n - - spawn
user=nobody argv=/usr/local/bin/python3.6 /usr/local/bin/tumgreyspf
Next, main.cf must be configured so that "smtpd_sender_restrictions"
includes a call to the tumgreyspf policy filter. If you already have
a "smtpd_sender_restrictions" line(s), you can add the following line
anywhere after the line which reads "reject_unauth_destination".
WARNING: It's very important that you have
"reject_unauth_destination" before the "check_policy_service". If
you do not, your system may be an open relay.
So, for example, a minimal "smtpd_sender_restrictions" may look like:
smtpd_sender_restrictions = reject_unauth_destination,
You will also need to have a line in the main.cf which reads:
tumgreyspf_time_limit = 3600
Please consult the postfix documentation for more information on
these and other settings you may wish to have in the
Install tumgreyspf txz package:
# pkg install tumgreyspf