

I do not issue any guarantee that this will work for you! 1 Preliminary Note. The following line is to be added to /etc/postfix/main.cf: smtpd_recipient_restrictions reject_rbl_client, reject_rbl_client bl. //If there are entries already - thats fine, just comment delimit them. Postfix, with a very simply modification can block incoming email via spamhaus RBLs (Real Time Black-Hole Lists). Open main.cf file: # vi /etc/postfix/main.cf Locate smtpd_recipient_restrictions line and setup reject_rbl_client as follows: smtpd_recipient_restrictions =. Under Postfix mail server you need to define DNSRBLs in main.cf file using the smtpd_recipient_restrictions configuration directive. Postfix MTA DNS Blackhole Lists Configuration. Those sections are for Postfix servers that accept connections from other hosts. Postfix mail dev nullįor a Null MTA client, you do not need to worry about x.509 certificate generation or Postfix MTA Server TLS Configuration. Guess what, one of our systems had actually a warning. If your configuration has any errors or warnings, they will show up.

In this case, we redirect all normal output (stdout) to the digital trash bin (/dev/null). The postconf command can be used to display the Postfix configuration, or make changes. In order to make these changes take affect, you have to rebuild the aliases database, build the virtual_alias database, and reload your Postfix configuration.

The usual solution is to forward to /dev/null, and in a local-only setup you could do that in /etc/aliases: do-not-reply: /dev/null However, if you’re using Postfix virtual domains, it gets a little more complicated.īlackhole: /dev/null This assumes that one of your mydestination domains in main.cf is localhost so that Postfix will actually consult the aliases file.
