ACL Policy Daemon for Postfix
ACL Policy Daemon (apolicy for short) communicates with the Postfix MTA using the Policy Delegation Protocol, implementing an ACL (Access Control List) system, making very easy to improve and create nice controls on your e-mail traffic. What can be done with ACL Policy Daemon:
- Flexible storage, use memory for fast responses or disk for high persistence
- SPF validation
- Control messages by day/time
- Variable message size limits per domain or e-mail
- Multiple RBL checking
- Reject a message only if the client's IP is listed on more than one RBL at the same time
- Small learning curve
Syntax heavily inspired by the Squid HTTP proxy ACL system
Various ACLs to use and combine
New features are planed on the Roadmap.
It is developed using Python and licensed under GPL version 2.
Project homepage at GNA, where we host the bug tracker, mailing list and the subversion repository: https://gna.org/projects/apolicy/
CIA.vc project page: http://cia.vc/stats/project/apolicy
Latest source code: ftp://ftp.uma.es/pub/apolicy/
Packaging - dependencies and other information
Mailing list: https://mail.gna.org/listinfo/apolicy-users/
Bug tracker: https://gna.org/bugs/?group=apolicy&func=additem
Subscribing to the RSS feed it is possible to follow what is going on in the source code repository.
Version 0.74 is available with configuration sintax enhanced, ldap support and message flow control
If you understand Portuguese, take a look at my blog: http://osysadmin.blogspot.com
Version 0.73 is available with two new ACLs, new memcached backend for greylisting. Changelog
If the ACL Policy Daemon is useful for you, let me know!
The ACL Policy Daemon is developed by Miguel Di Ciurcio Filho email@example.com
International Free Software Forum in Porto Alegre/Brazil. I gave a talk about how to extent Postfix functionality using the Access Policy Delegation protocol.