Name : postwhite
| |
Version : 3.4
| Vendor : obs://build_opensuse_org/home:uebelhacker
|
Release : 4.1
| Date : 2022-11-28 21:13:53
|
Group : Productivity/Networking/Email/Servers
| Source RPM : postwhite-3.4-4.1.src.rpm
|
Size : 0.19 MB
| |
Packager : (none)
| |
Summary : Automatic Postcreen Whitelist & Blacklist Generator
|
Description :
A script for generating a Postscreen whitelist (and optionally a blacklist) based on large and presumably trustworthy senders\' SPF records.
Postwhite uses the published SPF records from domains of known webmailers, social networks, ecommerce providers, and compliant bulk senders to generate a list of outbound mailer IP addresses and CIDR ranges to create a whitelist (and optionally a blacklist) for Postfix\'s Postscreen.
This allows Postscreen to save time and resources by immediately handing off whitelisted connections from these hosts (which we can somewhat safely presume are properly configured) to Postfix\'s smtpd process for further action. Blacklisted hosts are rejected before they reach Postfix\'s smtpd process.
Note this does not whitelist (or blacklist) email messages from any of these hosts. A whitelist for Postscreen (which is merely the first line of Postfix\'s defense) merely allows listed hosts to connect to Postfix without further tests to prove they are properly configured and/or legitimate senders. A Postscreen blacklist does nothing but reject the connection based on the blacklisted host\'s IP.
If all of the whitelist mailers are selected when Postwhite runs, the resulting whitelist includes over 500 outbound mail servers, all of which have a very high probability of being properly configured.
|
RPM found in directory: /packages/linux-pbone/ftp5.gwdg.de/pub/opensuse/repositories/home:/uebelhacker/SLE_12_SP4/noarch |