This file is indexed.

/var/lib/greylistd/whitelist-hosts is in greylistd 0.8.8.6.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
# This is a list of manual whitelist entries that have been discovered
# so far for various reasons.

# This is not meant to be a comprehensive list of all servers that should be 
# considered legitimate, merely a list of servers that for one reason or 
# another may either have some type of problem with the Greylisting method, 
# or because of a recognized need to avoid the delay that it may cause.

# These are common entries that most people using greylisting will probably 
# want to have.  If you happen to discover ones that aren't in this list, 
# or that the IP's in this list have changed, please let me know at 
# eharris@puremagic.com, after reading the next paragraph carefully.

# PLEASE NOTE - PLEASE NOTE - PLEASE NOTE - PLEASE NOTE - PLEASE NOTE
# Any submission for inclusion to this list should be accompanied by
# the IP's or address range of the mailservers that have a problem sending 
# to Greylisting servers, the name/url of the organization running these 
# problem servers, and a detail of the specific reason(s) why their systems
# have a problem with Greylisting, and also the type of mail server softare
# they are running (if known).

# Valid reasons for inclusion on this list are:
#   1. They have a pool of round-robin outbound mail servers that spans more 
#      than one /24 netblock.
#   2. They have software that considers a 4xx temporary mail failure to be
#      a permanent bounce.
#   3. Their mail servers retry delivery for 4xx failures continually with
#      no delay.
#   4. Their mail servers either don't retry at all, or have a very long 
#      retry delay (more than 5 hours).
#   5. The mail servers use a unique sender address for each delivery
#      attempt, even for the same piece of mail.  (also known as VERP).
#   6. The mail servers host high volume mailing lists with a general appeal
#      that try to track bounces by using a unique sender address for each
#      mail (also known as VERP).

# Generally, submissions of servers that do not meet at least one of the 
# above criteria will not be accepted for inclusion in this list.  This 
# includes servers that handle Greylisting ok, but that you consider 
# "legitimate", and don't want their mail delayed.  Since "legitimate" is a
# subjective distinction, I believe that those types of whitelist entries 
# are better left for individual administrators to decide.

# ****** IF YOU ARE USING A DIFFERENT IMPLEMENTATION THAN RELAYDELAY ******
# Before submitting a potential entry, please check that your implementation
# uses the 451 error code (not 450 or another 4xx code).  Some problems have
# been reported for sites like MSN/Hotmail, Prodigy, and various other 
# senders that appear to be having "weird" retry patterns (sometimes 
# resulting in bounces) when using code 450 or others.

# Because error code 450 is most commonly used for a mailbox lock failure,
# many sites seem to treat it as a very short duration failure, and will
# retry several times within seconds, and then bounce the mail, while they
# handle a code 451 more "normally".

# Here's an example command to use in a mysql shell to insert 
#   a whitelist entry (assumes defaults from dbdef.sql):
# INSERT INTO relaytofrom (relay_ip, record_expires, create_time) 
#   VALUES ('127.0.0.1', '9999-12-31 23:59:59', NOW());

# Example valid values:
# 10.0.0.0/8
# 10.0.0.0/24
# 10.0.0.0/29
# 10.0.0.5
# and NOT valid:
# 10.0.0.5/32

127.0.0.1               # Of course we don't want to delay ourselves or local users
192.168.0.0/16          # Don't delay our private networks either
10.0.0.0/8              # Private net (class A)
172.16.0.0/12           # Another private net

# Public Servers

12.5.136.141            # Southwest Airlines (unique sender, no retry)
12.5.136.142            # Southwest Airlines (unique sender, no retry)
12.107.209.244          # kernel.org mailing lists (high traffic, unique sender per mail)
12.107.209.250          # sourceware.org mailing lists (high traffic, unique sender per mail)
63.82.37.110            # SLmail
64.7.153.18             # sentex.ca (common pool)
64.12.137.0/24          # AOL (common pool) - http://postmaster.aol.com/servers/imo.html
64.12.138.0/24          # AOL (common pool)
64.124.204.39           # moveon.org (unique sender per attempt)
64.125.132.254          # collab.net (unique sender per attempt)
#64.233.170             # gmail (common server pool)
#65.82.241.160          # Groupwise?
#66.94.237              # Yahoo Groups?
66.100.210.82           # Groupwise?
66.135.209.0/24         # Ebay (for time critical alerts)
66.135.197.0/24         # Ebay (common pool)
66.162.216.166          # Groupwise?
66.206.22.82            # PLEXOR
66.206.22.83            # PLEXOR
66.206.22.84            # PLEXOR
66.206.22.85            # PLEXOR
66.218.66.0/24          # Yahoo Groups servers (common pool, no retry)
66.218.67.0/24          # Yahoo Groups servers (common pool, no retry)
66.218.69.0/24          # Yahoo Groups servers (common pool, no retry)
66.27.51.218            # ljbtc.com (Groupwise)
#66.89.73.101           # Groupwise?
#68.15.115.88           # Groupwise?
152.163.225.0/24        # AOL (common pool)
194.245.101.88          # Joker.com (email forwarding server)
195.235.39.19           # Tid InfoMail Exchanger v2.20
195.238.2.105           # skynet.be (wierd retry pattern)
195.238.2.124           # skynet.be (common pool)
195.238.3.12            # skynet.be (common pool)
195.238.3.13            # skynet.be (common pool)
#204.60.8.162           # Groupwise?
204.107.120.10          # Ameritrade (no retry)
205.188.139.136         # AOL (common pool)
205.188.139.137         # AOL (common pool)
205.188.144.207         # AOL (common pool)
205.188.144.208         # AOL (common pool)
205.188.156.66          # AOL (common pool)
205.188.157.0/24        # AOL (common pool)
205.188.159.7           # AOL (common pool)
205.206.231.0/24        # SecurityFocus.com (unique sender per attempt)
205.211.164.50          # sentex.ca (common pool)
207.115.63.0/24         # Prodigy (broken software that retries continually with no delay)
207.171.168.0/24        # Amazon.com (common pool)
207.171.180.0/24        # Amazon.com (common pool)
207.171.187.0/24        # Amazon.com (common pool)
207.171.188.0/24        # Amazon.com (common pool)
207.171.190.0/24        # Amazon.com (common pool)
211.29.132.0/24         # optusnet.com.au (wierd retry pattern and more than 48hrs)
213.136.52.31           # Mysql.com (unique sender)
#216.136.226.0          # Yahoo Mail?
#216.157.204.5          # Groupwise?
217.158.50.178          # AXKit mailing list (unique sender per attempt)