A simple way to address this peculiar need would be to implement full netmask matching in milter-greylist's "dnsrbl" clause instead of (or as an alternative to) CIDR mask. This would allow something like: dnsrbl "DNSWL" list.dnswl.org 127.0.0.3/255.255.0.255 Regular expressions could do the job as well, but somewhat heavier... Le 30/11/2016 \ufffd 18:18, Marcus Schopen lists-yahoogroups@... [milter-greylist] a \ufffdcrit : > Hi, > > I'd like to whitelist IPs listed on lists.dnswl.org with trust "high", > which means a return code of > > 127.0.x.3 > > x can be a value from 2 up to 15, depending on the category of the > sending host ( see: https://www.dnswl.org/?page_id=15#returncodes ). > > How would a dnsrbl rule look like? Are regular expressions allowed? > > dnsrbl "MTAWL" list.dnswl.org ???? > > Ciao! -- Benoit BRANCIARD Service InfraStructures (SIS) Direction du Syst\ufffdme d'Information et des Usages Num\ufffdriques (DSIUN) Universit\ufffd Paris 1 Panth\ufffdon-Sorbonne Centre Pierre Mend\ufffds France 90 rue de Tolbiac - 75634 Paris cedex 13 - France Bur. B406 - T\ufffdl +33 1 44 07 89 68 - Fax +33 1 44 07 89 66 Accueil: +33 1 44 07 89 65 - Assistance-DSIUN@... http://dsi.univ-paris1.fr
Message
Re: [milter-greylist] dnsrbl: how to handle list.dnswl.org return codes?
2016-12-01 by Benoit Branciard
Attachments
- No local attachments were found for this message.