docker-mailserver: 550 5.7.1 Service unavailable; client [xxx.xxx.xxx.xxx] blocked using zen.spamhaus.org
Today I got an absolutely ridiculous problem, after noticing that I’ve not been receiving emails at all, since the morning…
I decided to do a test, by sending an email to my mailbox, from an external address, and here is the result:
550 5.7.1 Service unavailable; client [xxx.xxx.xxx.xxx] blocked using zen.spamhaus.org
After investigating, I see the problem is similar to #1781
And gladly, someone’s comment drove me to the solution, which is to overwrite the following configs in “postfix-main.cf”:
postscreen_dnsbl_sites
smtpd_recipient_restrictions
Removing the offender instructions for zen.spamhaus.org
.
Now, I have a few questions:
-
What does it mean that emails are “blocked using zen.spamhaus.org” ? Does this mean my domain/IP was blocked somehow? Is this something that only affects me, or nothing to do with “me” (“my domain”) ?
-
Why are these “sites” in my configurations? Who decides to put these sites as default?
I’m just very concerned with the fact that these 3rd party sites, that I never heard about before, can so easily “break” the receiving of emails on my server…
- Is there a way to recover all the emails that were lost during the day?
This is just absolutely ridiculous…
I’m not blaming you at all. I understand you don’t control “zen.spamhaus.org”. But I definitely want to prevent this from happening in the future.
I’m on the latest 7.x version.
Thank you.
About this issue
- Original URL
- State: closed
- Created 3 years ago
- Reactions: 3
- Comments: 20 (17 by maintainers)
The sending system is on a block list.
They were added by this project in the past and are not part of the postfix default configuration.
Probably not.
I have the same opinion. I don’t like the fact, that mails are silently blocked/discard. I want to receive all mails, but marked as spam. Thats why I also disabled all DNS block lists and use Spamassassin only.
fyi: The same goes for Antivirus (clamav). If an email is considered harmful (e.g. containing “dangerous” attachments), it will be discarded.
With v11 we wanted to remove DNS blocking completely and making it opt-in.
I would define a breaking change to be one after which one would (possibly) not be able to use the mail server anymore without taking action. This is not the case here, right? I’m just curious because I have nothing against this going into
v10.4
.Sure, but without guarantee for completeness. That’s what I found out so far.
These are my “deliver all mails” hacks:
config/postfix-main.cf
:config/user-patches.sh
:I saw two closed issues still pinned. I thought they could safely be removed.
I will pin this back up.
Very good! Thank you for that.
I also don’t use quotas, so I went ahead and put
ENABLE_QUOTAS=0
in the env file.Really appreciate your help here. Yeah, since the “main.cf” configs may change, it’s probably better to use patches instead. I’ll look into that too.
As this issue is now resolved, I’ll go ahead and close this ticket, just so it doesn’t remain unnecessarily open!
Have a great day!
I just removed the DNS blacklists from the original string some time ago.
check_policy_service inet:localhost:65265
must have been added later. However I checked my setup and there is no service listening on port 65265.It’s seems to be related to postfix quotas:
https://github.com/docker-mailserver/docker-mailserver/blob/69402b0bfade5366bd0bd81cdc710e191110efa0/target/scripts/startup/setup-stack.sh#L290-L291
Lucky me, I don’t use quotas 😄
PS: You might also the check the env variable
POSTSCREEN_ACTION
and set it toignore
.Edit: I now remove the DNS blacklist via user-patches.sh which is future proof (hopefully):
sed -i '/^smtpd_recipient_restrictions = / s/, reject_rbl_client zen.spamhaus.org//' /etc/postfix/main.cf