• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

SMTP Auth is still disabled by RBL in 9.5 (Postfix)

C

ChristopheP

Guest
Hi,

I reported this behaviour in 9.3 and 9.2 but nothing was done : when you enable a SBL server to filter bad hosts,send emails anymore through SMTP authentication. this is caused by the in generated in main.cf file:

smtpd_client_restrictions = reject_rbl_client pbl.spamhaus.org , permit_mynetworks, permit_sasl_authenticated

Again, to fix this then the script that generated main.cf must put the reject_rbl at the end of the line:
smtpd_client_restrictions = permit_mynetworks, permit_sasl_authenticatedreject_rbl_client pbl.spamhaus.org

This is just a few minutes of dev time to fix this and make us stop answering angry customer phone calls.

regards
 
This also matters if you use whitelists or anything else. The rbls go at the end if any other existing commands.

Can the developers fix this please?
 
Maybe more:

smtpd_client_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_rbl_client pbl.spamhaus.org
 
It appears that two and a half years later this has not been fixed. Current Plesk 11 installs do not add the permit_sasl_authenticated to the smtpd_client_restrictions line at all, so a customer who is on a blacklist at their remote location cannot send outbound messages even if they have the proper authentication settings; they'll be RBL rejected first.

The smtpd_client_restrictions line should be:

smtpd_client_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_rbl_client <RBL Name>

but Plesk 10 and 11 still create it as:

smtpd_client_restrictions = permit_mynetworks, reject_rbl_client <RBL Name>

with the permit_sasl_authenticated flag missing.
 
Also getting customer complaints.

Has anything been done about the ability to manage this or to bypass the RBL by default on port 587 by default?
 
Bump.

Is this is still an issue? We've recently received complaints regarding this.

Is it safe to change the smtpd_client_restrictions line in main.cf, as indicated above, without any issues?

I've changed two of our Plesk 11 (CentOS 6.4, Postfix) servers to use the configuration below...

smtpd_client_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_rbl_client <RBL Name>

Should I expect any issues?
 
Still broken through Plesk 11.5; haven't tried 12 yet.

Run this via CLI to fix:

/usr/bin/perl -pi -e 's/permit_mynetworks, reject_rbl_client/permit_mynetworks, permit_sasl_authenticated, reject_rbl_client/g' /etc/postfix/main.cf
 
Back
Top