cf servercf connection failedd怎么回事

穿越火线进入后选择服务器出现server connection failed_百度知道System Error
We're sorry but a serious error has occurred in the system.24小时点击排行
24小时最新排行
重点栏目导航
CF达人专题
英雄级,致力于打造最专业的平台,助CFer玩转穿越火线!
蓝蝌蚪旗下网站,Lankdo Network&Technology Co.,Ltd.
闽ICP备号-2Postfix SMTP Access Policy Delegation
Postfix SMTP Access Policy Delegation
Purpose of Postfix SMTP access policy delegation
The Postfix SMTP server has a number of built-in mechanisms to
block or accept mail at specific SMTP protocol stages. In addition,
the Postfix SMTP server can delegate decisions to an external policy
server (Postfix 2.1 and later).
With this policy delegation mechanism, a simple
policy can be implemented with only a dozen lines of
Perl, as is shown at the end of this document. A complete example
can be found in the Postfix source code, in the directory
examples/smtpd-policy.
Another example of policy delegation is the SPF policy server
Policy delegation is now the preferred method for adding policies
to Postfix. It's much easier to develop a new feature in few lines
of Perl, Python, Ruby, or TCL, than trying to do the same in C code.
The difference in
performance will be unnoticeable except in the most demanding
environments. On active systems a policy daemon process is used
multiple times, for up to $ incoming SMTP connections.
This document covers the following topics:
The Postfix policy delegation protocol is really simple. The
client request is a sequence of name=value attributes separated by
newline, and is terminated by an empty line. The server reply is
one name=value attribute and it, too, is terminated by an empty
Here is an example of all the attributes that the Postfix SMTP
server sends in a delegated SMTPD access policy request:
Postfix version 2.1 and later:
request=smtpd_access_policy
protocol_state=RCPT
protocol_name=SMTP
helo_name=some.domain.tld
sender=foo@bar.tld
recipient=bar@foo.tld
recipient_count=0
client_address=1.2.3.4
client_name=another.domain.tld
reverse_client_name=another.domain.tld
instance=123.456.7
Postfix version 2.2 and later:
sasl_method=plain
sasl_username=you
sasl_sender=
size=12345
ccert_subject=solaris9.porcupine.org
ccert_issuer=Wietse+20Venema
ccert_fingerprint=C2:9D:F4:87:71:73:73:D9:18:E7:C2:F3:C1:DA:6E:04
Postfix version 2.3 and later:
encryption_protocol=TLSv1/SSLv3
encryption_cipher=DHE-RSA-AES256-SHA
encryption_keysize=256
etrn_domain=
Postfix version 2.5 and later:
Postfix version 2.9 and later:
ccert_pubkey_fingerprint=68:B3:29:DA:98:93:E3:40:99:C7:D8:AD:5C:B9:C9:40
Postfix version 3.0 and later:
client_port=1234
Postfix version 3.1 and later:
policy_context=submission
Postfix version 3.2 and later:
server_address=10.3.2.1
server_port=54321
[empty line]
The "request" attribute is required. In this example
the request type is "smtpd_access_policy".
The order of the attributes does not matter. The policy
server should ignore any attributes that it does not care about.
When the same attribute name is sent more than once,
the server may keep the first value or the last attribute value.
When an attribute value is unavailable, the client
either does not send the attribute, sends the attribute with
an empty value ("name="), or sends a zero value ("name=0") in
the case of a numerical attribute.
The "recipient" attribute is available in the "RCPT
TO" stage. It is also available in the "DATA" and "END-OF-MESSAGE"
stages if Postfix accepted only one recipient for the current
The "recipient_count" attribute (Postfix 2.3 and later)
is non-zero only in the "DATA" and "END-OF-MESSAGE" stages. It
specifies the number of recipients that Postfix accepted for
the current message.
The remote client or local server IP address is an
IPv4 dotted quad in the form 1.2.3.4 or it is an IPv6 address
in the form 1:2:3::4:5:6.
The remote client or local server port is a decimal
number in the range 0-65535.
For a discussion of the differences between reverse
and verified client_name information, see the
discussion in the
An attribute name must not contain "=", null or newline,
and an attribute value must not contain null or newline.
The "instance" attribute value can be used to correlate
different requests regarding the same message delivery. These
requests are sent over the same policy connection (unless the
policy daemon terminates the connection).
Once Postfix sends
a query with a different instance attribute over that same
policy connection, the previous message delivery is either
completed or aborted.
The "size" attribute value specifies the message size
that the client specified in the MAIL FROM command (zero if
none was specified). With Postfix 2.2 and later, it specifies
the actual message size when the client sends the END-OF-DATA
The "sasl_*" attributes (Postfix 2.2 and later) specify
information about how the client was authenticated via SASL.
These attributes are empty in case of no SASL authentication.
The "ccert_*" attributes (Postfix 2.2 and later) specify
information about how the client was authenticated via TLS.
These attributes are empty in case of no certificate authentication.
As of Postfix 2.2.11 these attribute values are encoded as
xtext: some characters are represented by +XX, where XX is the
two-digit hexadecimal representation of the character value. With
Postfix 2.6 and later, the decoded string is an UTF-8 string
without non-printable ASCII characters.
The "encryption_*" attributes (Postfix 2.3 and later)
specify information about how the connection is encrypted. With
plaintext connections the protocol and cipher attributes are
empty and the keysize is zero.
The "etrn_domain" attribute is defined only in the
context of the ETRN command, and specifies the ETRN command
parameter.
The "stress" attribute is either empty or "yes".
document for further information.
The "policy_context" attribute provides a way to pass
information that is not available via other attributes (Postfix
version 3.1 and later).
The following is specific to SMTPD delegated policy requests:
Protocol names are ESMTP or SMTP.
Protocol states are CONNECT, EHLO, HELO, MAIL, RCPT,
DATA, END-OF-MESSAGE, VRFY or ETRN; these are the SMTP protocol
states where
the Postfix SMTP server makes an OK/REJECT/HOLD/etc. decision.
The policy server replies with any action that is allowed in a
Postfix SMTPD
table. Example:
action= Service temporarily unavailable
[empty line]
This causes the Postfix SMTP server to reject the request with
a 450 temporary error code and with text "Service temporarily
unavailable", if the Postfix SMTP server finds no reason to reject
the request permanently.
In case of trouble the policy server must not send a reply.
Instead the server must log a warning and disconnect.
Postfix will
retry the request at some later time.
The Postfix delegated policy client can connect to a TCP socket
or to a UNIX-domain socket. Examples:
inet:127.0.0.1:9998
unix:/some/where/policy
unix:private/policy
The first example specifies that the policy server listens on
a TCP socket at 127.0.0.1 port 9998. The second example specifies
an absolute pathname of a UNIX-domain socket. The third example
specifies a pathname relative to the Pos use
this for policy servers that are spawned by the Postfix master
To create a policy service that listens on a UNIX-domain socket
called "policy", and that runs under control of the Postfix
daemon, you would use something like this:
1 /etc/postfix/:
user=nobody argv=/some/where/policy-server
5 /etc/postfix/:
unix:private/policy
Lines 2-3: this creates the service called "policy" that
listens on a UNIX-domain socket. The service is implemented by the
daemon, which executes the policy server program
that is specified with the argv attribute, using the privileges
specified with the user attribute.
Line 2: specify a "0" process limit instead of the default
"-", to avoid "connection refused" and other problems when you
increase the smtpd process limit.
is not needed here if
the mail relay policy is specified with
(available with Postfix 2.10 and later).
Lines 8, 9: always specify "" AFTER
"" or else your system could become an
open relay.
Line 11: this increases the time that a policy server
process may run to 3600 seconds.
The default time limit of 1000
the policy daemon needs to run long as the
SMTP server process that talks to it.
manpage for more information about the
parameter.
Note: the "" parameter will not
show up in "postconf" command output before Postfix version 2.9.
This limitation applies to many parameters whose name is a combination
service name (in the above example, "policy") and a
built-in suffix (in the above example: "_time_limit").
Line 12: specify
avoid error-recovery delays with policy servers that cannot
maintain a persistent connection.
With Solaris & 9, or Postfix & 2.10 on any Solaris
version, use TCP sockets instead of UNIX-domain sockets:
1 /etc/postfix/:
127.0.0.1:9998
user=nobody argv=/some/where/policy-server
5 /etc/postfix/:
inet:127.0.0.1:9998
127.0.0.1:9998_time_limit = 3600
Configuration parameters that control the client side of the
policy delegation protocol:
(default: 451 4.3.5
Server configuration problem): The default action when an SMTPD
policy service request fails.
Available with Postfix 3.0 and
(default: 300s): The amount
of time before the Postfix SMTP server closes an unused policy
client connection.
(default: 1000s): The amount
of time before the Postfix SMTP server closes an active policy
client connection.
(default: 0): The maximal
number of requests per policy connection, or zero (no limit).
Available with Postfix 3.0 and later.
(default: 100s): The time
limit to connect to, send to or receive from a policy server.
(default: 2): The maximal
number of attempts to send an SMTPD policy service request before
giving up.
Available with Postfix 3.0 and later.
(default: 1s): The delay
between attempts to resend a failed SMTPD policy service request.
Available with Postfix 3.0 and later.
(default: empty):
Optional information that is passed in the "policy_context" attribute
of an SMTPD policy service request (originally, to share the same
SMTPD service endpoint among multiple
Available with Postfix 3.1 and later.
Configuration parameters that control the server side of the
policy delegation protocol:
maximal amount of time the policy daemon is allowed to run before
it is terminated. The transport is the service name of the
entry for the policy daemon service. In the above
examples, the service name is "policy" or "127.0.0.1:9998".
The previous section lists a number of Postfix
parameters
that control time limits and other settings for all policy clients.
This is sufficient for simple configurations. With more complex
configurations it becomes desirable to have different settings per
policy client. This is supported with Postfix 3.0 and later.
The following example shows a "non-critical" policy service
with a short timeout, and with "DUNNO" as default action when the
service is unvailable. The "DUNNO" action causes Postfix to ignore
the result.
1 /etc/postfix/:
{ inet:host:port,
timeout=10s, default_action=DUNNO }
Instead of a server endpoint, we now have a list enclosed in {}.
Line 5: The first item in the list is the server endpoint.
This supports the exact same "inet" and "unix" syntax as described
Line 6: The remainder of the list contains per-client
settings. These settings override global
parameters,
and have the same name as those parameters, without the
"smtpd_policy_service_" prefix.
Inside the list, syntax is similar to what we already know from
: items separated by space or comma. There is one difference:
you must enclose a setting in parentheses, as in "{ name = value
}", if you want to have space or comma within a value or around
This comes in handy when different policy servers require
different default actions with different SMTP status codes or text:
1 /etc/postfix/:
inet:host:port1,
{ default_action = 451 4.3.5 See
Greylisting is a defense against junk email that is described at
. The idea was discussed on the
postfix-users mailing list
one year before it was popularized.
The file examples/smtpd-policy/greylist.pl in the Postfix source
tree implements a simplified greylist policy server. This server
stores a time stamp for every (client, sender, recipient) triple.
By default, mail is not accepted until a time stamp is more than
60 seconds old. This stops junk mail with randomly selected sender
addresses, and mail that is sent through randomly selected open
proxies. It also stops junk mail from spammers that change their
IP address frequently.
Copy examples/smtpd-policy/greylist.pl to /usr/libexec/postfix
or whatever location is appropriate for your system.
In the greylist.pl Perl script you need to specify the
location of the greylist database file, and how long mail will
be delayed before it is accepted. The default settings are:
$database_name="/var/mta/greylist.db";
$greylist_delay=60;
The /var/mta directory (or whatever you choose) should be
writable by "nobody", or by whatever username you configure below
for the policy service.
# mkdir /var/mta
# chown nobody /var/mta
Note: DO NOT create the greylist database in a world-writable
directory such as /tmp or /var/tmp, and DO NOT create the greylist
database in a file system that may run out of space. Postfix can
survive "out of space" conditions with the mail queue and with the
mailbox store, but it cannot survive a corrupted greylist database.
If the file becomes corrupted you may not be able to receive mail
at all until you delete the file by hand.
The greylist.pl Perl script can be run under control by
the Postfix master daemon.
For example, to run the script as user
"nobody", using a UNIX-domain socket that is accessible by Postfix
processes only:
1 /etc/postfix/:
user=nobody argv=/usr/bin/perl /usr/libexec/postfix/greylist.pl
5 /etc/postfix/:
unix:private/greylist
Lines 2-3: this creates the service called "greylist" that
listens on a UNIX-domain socket. The service is implemented by the
daemon, which executes the greylist.pl script that
is specified with the argv attribute, using the privileges
specified with the user attribute.
Line 2: specify a "0" process limit instead of the default
"-", to avoid "connection refused" and other problems when you
increase the smtpd process limit.
Line 3: Specify "greylist.pl -v" for verbose logging of
each request and reply.
Line 6: this increases the time that a greylist server
process may run to 3600 seconds.
The default time limit of 1000
the greylist daemon needs to run long as the
SMTP server process that talks to it.
manpage for more information about the
parameter.
is not needed here if
the mail relay policy is specified with
(available with Postfix 2.10 and later).
Note: the "" parameter will not
show up in "postconf" command output before Postfix version 2.9.
This limitation applies to many parameters whose name is a combination
service name (in the above example, "greylist") and
a built-in suffix (in the above example: "_time_limit").
Line 12: specify
avoid error-recovery delays with policy servers that cannot
maintain a persistent connection.
With Solaris & 9, or Postfix & 2.10 on any Solaris
version, use inet: style sockets instead of unix:
style, as detailed in the "" section above.
1 /etc/postfix/:
127.0.0.1:9998
user=nobody argv=/usr/bin/perl /usr/libexec/postfix/greylist.pl
5 /etc/postfix/:
127.0.0.1:9998_time_limit = 3600
inet:127.0.0.1:9998
It is relatively safe to turn on greylisting for specific
domains that often appear in forged email.
At some point
in cyberspace/time a list of frequently
forged MAIL FROM domains could be found at
1 /etc/postfix/:
:/etc/postfix/sender_access
= greylist
greylist =
unix:private/greylist
11 /etc/postfix/sender_access:
... etcetera ...
Line 9: On Solaris & 9, or Postfix & 2.10 on any
Solaris version, use inet: style sockets
instead of unix: style, as detailed in the "" section above.
is not needed here if
the mail relay policy is specified with
(available with Postfix 2.10 and later).
Line 6: Be sure to specify "" AFTER
"" or else your system could become an
open mail relay.
Line 3: With Postfix 2.0 snapshot releases,
"" is called "check_recipient_maps".
Postfix 2.1 understands both forms.
Line 3: The greylist database gets polluted quickly with
bogus addresses.
It helps if you protect greylist lookups with
other restrictions that reject unknown senders and/or recipients.
If you turn on greylisting for all mail you may want to make
exceptions for mailing lists that use one-time sender addresses,
because each message will be delayed due to greylisting, and the
one-time sender addresses can pollute your greylist database
relatively quickly. Instead of making exceptions, you can automatically
whitelist clients that survive gr this avoids
most of the delays and most of the database pollution problem.
1 /etc/postfix/:
:/etc/postfix/sender_access
unix:private/policy
10 /etc/postfix/sender_access:
Line 7: On Solaris & 9, or Postfix & 2.10 on any
Solaris version, use inet: style sockets
instead of unix: style, as detailed in the "" section above.
is not needed here if
the mail relay policy is specified with
(available with Postfix 2.10 and later).
Lines 6-7: Be sure to specify
or else your
system could become an open mail relay.
Line 3: The greylist database gets polluted quickly with
bogus addresses.
It helps if you precede greylist lookups with
restrictions that reject unknown senders and/or recipients.
The greylist database grows over time, because the greylist server
never removes database entries. If left unattended, the greylist
database will eventually run your file system out of space.
When the status file size exceeds some threshold you can simply
rename or remove the file wit Postfix
automatically creates a new file. In the worst case, new mail will
be delayed by an hour or so. To lessen the impact, rename or remove
the file in the middle of the night at the beginning of a weekend.
This is the Perl subroutine that implements the example greylist
It is part of a general purpose sample policy server that
is distributed with the Postfix source as
examples/smtpd-policy/greylist.pl.
# greylist status database and greylist time interval. DO NOT create the
# greylist status database in a world-writable directory such as /tmp
# or /var/tmp. DO NOT create the greylist database in a file system
# that can run out of space.
$database_name="/var/mta/greylist.db";
$greylist_delay=60;
# Auto-whitelist threshold. Specify 0 to disable, or the number of
# successful "come backs" after which a client is no longer subject
# to greylisting.
$auto_whitelist_threshold = 10;
# Demo SMTPD access policy routine. The result is an action just like
# it would be specified on the right-hand side of a Postfix access
Request attributes are available via the %attr hash.
sub smtpd_access_policy {
my($key, $time_stamp, $now);
# Open the database on the fly.
open_database() unless $database_
# Search the auto-whitelist.
if ($auto_whitelist_threshold & 0) {
$count = read_database($attr{"client_address"});
if ($count & $auto_whitelist_threshold) {
return "dunno";
# Lookup the time stamp for this client/sender/recipient.
lc $attr{"client_address"}."/".$attr{"sender"}."/".$attr{"recipient"};
$time_stamp = read_database($key);
$now = time();
# If new request, add this client/sender/recipient to the database.
if ($time_stamp == 0) {
$time_stamp = $
update_database($key, $time_stamp);
# The result can be any action that is allowed in a Postfix
# To label the mail, return ``PREPEND headername: headertext''
# In case of success, return ``DUNNO'' instead of ``OK'', so that the
restriction can be followed by other restrictions.
# In case of failure, return ``DEFER_IF_PERMIT optional text...'',
# so that mail can still be blocked by other access restrictions.
syslog $syslog_priority, "request age %d", $now - $time_stamp if $
if ($now - $time_stamp & $greylist_delay) {
# Update the auto-whitelist.
if ($auto_whitelist_threshold & 0) {
update_database($attr{"client_address"}, $count + 1);
return "dunno";
return " Service temporarily unavailable";

参考资料

 

随机推荐