A simple way to address this peculiar need would be to implement full
netmask matching in milter-greylist's "dnsrbl" clause instead of (or as
an alternative to) CIDR mask.
This would allow something like:
dnsrbl "DNSWL" list.dnswl.org 127.0.0.3/255.255.0.255
Regular expressions could do the job as well, but somewhat heavier...
Le 30/11/2016 \ufffd 18:18, Marcus Schopen lists-yahoogroups@...
[milter-greylist] a \ufffdcrit :
> Hi,
>
> I'd like to whitelist IPs listed on lists.dnswl.org with trust "high",
> which means a return code of
>
> 127.0.x.3
>
> x can be a value from 2 up to 15, depending on the category of the
> sending host ( see: https://www.dnswl.org/?page_id=15#returncodes ).
>
> How would a dnsrbl rule look like? Are regular expressions allowed?
>
> dnsrbl "MTAWL" list.dnswl.org ????
>
> Ciao!
--
Benoit BRANCIARD
Service InfraStructures (SIS)
Direction du Syst\ufffdme d'Information et des Usages Num\ufffdriques (DSIUN)
Universit\ufffd Paris 1 Panth\ufffdon-Sorbonne
Centre Pierre Mend\ufffds France
90 rue de Tolbiac - 75634 Paris cedex 13 - France
Bur. B406 - T\ufffdl +33 1 44 07 89 68 - Fax +33 1 44 07 89 66
Accueil: +33 1 44 07 89 65 - Assistance-DSIUN@...
http://dsi.univ-paris1.fr