Hi, as I understand there is no addr regex matching implemented right now. A workaround could be to use urlcheck to call an external web script to do the dns check and return properties depending on the trustworthiness score which milter-greylist can handle then: ---- urlcheck "WL_DNSWL" "https://yourdomain/dnswl.php?revip=%j" 5 getprop dnsrbl "WL_SPAMHAUS" swl.spamhaus.org 127.0.2.0/24 racl continue rset $wl_score=0 racl continue rset $wl_dnswl_trustscore="-1" racl continue urlcheck "WL_DNSWL" $wl_dnswl_trustscore == 3 set $wl_score+=1 racl continue dnsrbl "WL_SPAMHAUS" set $wl_score+=1 racl "WL_DNSWL" whitelist $wl_score >= 1 ---- These rules whitelist a sending host which is know by swl.spamhaus.org or has a "high" score (= 3) on list.dnswl.org. [1] A basic php script for urlcheck is attached. Any other ideas? Ciao Marcus [1] https://www.dnswl.org/?page_id=15
Message
Re: [milter-greylist] dnsrbl: how to handle list.dnswl.org return codes?
2016-12-01 by Marcus Schopen