Add to Favourites Add to Favourites    Print this Article Print this Article

Skip SpamBlocker, EasySpamFighter and BlockCracking checks for smtp-auth deliveries

If you're sending many emails with an smtp-auth account, you may want to skip several checks.
SB 4.4.x, ESF, and BC, all have skip lists which can be used for various things, including email addresses.
If you have smtp-auth/From account , sending from IP , type:

echo >> /etc/virtual/esf_skip_senders
echo >>  /etc/virtual/bc_skip_authenticated_users
echo >> /etc/virtual/esf_skip_ips
echo >> /etc/virtual/skip_rbl_hosts_ip

which should skip some of the checks for that account, from that IP (different checks, so you don't need to skip the IP if you don't want to).

RBLs can also cause a slowdown, so adding the "To" / destination local domain to these files will speed up delivery to them:


but are not applicable if all of the destination emails are external to the server.

Note that there are files in /etc/virtual that contain the name "whitelist".
Do NOT add any domains, IPs or emails to these files, as they refer to an open relay whitelist, and they're not meant for production use, only for temporary testing.  If you add any value to these files, any matches for them will no longer require smtp-auth, giving them open relay, which is a bad thing.

If you have as sender that is getting caught in an RBL block and you don't want a specific domain or email to be checked by the SpamBlocker RBLs, then you can use this file


to add "From" emails to whitelist. Just be very careful when using the whitelist files in /etc/virtual, as for many cases it fully opens up any email with that value to do whatever they want, open relay in some cases.  Use very sparingly.  The whitelist_senders file specifically does not create an open relay, so it's ok to use for certain cases where you do not want any checking being done (skips everything, but still requires auth for relay)

To skip a hostname or group of hostnames from the ESF checks (usually to allow incoming from them for SPF or DKIM failures), you'd use:


which supports wildcards, eg:


Was this answer helpful?

Also Read