Carlos Alberto Bernat Orozco wrote:
Hi group

I'm writing to you as my only hope. I'm very dissapointed because I'm
black listed due to a misconfiguration that I haven't found where.

This is the problem. From a time, I've been watching my logs and this
is what I see:

Jul 14 23:48:21 server postfix/qmgr[11448]: A9044104A29: from=<>,
size=3613, nrcpt=1 (queue active)
Jul 14 23:48:21 server postfix/qmgr[11448]: 89CB2104C08:
from=<[EMAIL PROTECTED]>, size=1734, nrcpt=4 (queue active)
Jul 14 23:48:21 server postfix/qmgr[11448]: 5C3651049D2: from=<>,
size=3197, nrcpt=1 (queue active)
Jul 14 23:48:21 server postfix/qmgr[11448]: 5F140104BF2:
from=<[EMAIL PROTECTED]>, size=1799, nrcpt=4 (queue active)

A lot of this. It appears I'm sending backscatter email. The account
"ber" doesn't even exist and the "from=<>" is impossible to block
until moment. I read the next:

http://www.postfix.org/BACKSCATTER_README.html

But here is what I don't know why this happening.

How can I block this? I know I'm not an open relay. So why is this
happening? I send my postconf

# postconf -n
smtpd_client_restrictions = check_client_access
hash:/etc/postfix/access,       permit_mynetworks,
reject_unknown_client,      reject_rbl_client zen.spamhaus.org,
permit
[...]
smtpd_helo_restrictions = permit_mynetworks,    check_helo_access
hash:/etc/postfix/helo.regexp,        reject_non_fqdn_hostname,
reject_invalid_hostname,        permit
smtpd_recipient_restrictions = check_client_access
hash:/etc/postfix/client_checks,        check_sender_access
hash:/etc/postfix/sender_checks,     reject_invalid_hostname,
reject_non_fqdn_sender, reject_non_fqdn_recipient,
reject_unknown_sender_domain,       reject_unknown_recipient_domain,
     permit_mynetworks,      reject_unauth_destination,
check_client_access hash:/etc/postfix/rbl_client_exceptions,
reject_rbl_client zen.spamhaus.org,     permit
smtpd_sender_restrictions = check_sender_access
hash:/etc/postfix/sender_checks,        permit_mynetworks,
reject_non_fqdn_sender,     reject_unknown_sender_domain,   permit

First, what is in the following maps?
/etc/postfix/client_checks
/etc/postfix/sender_checks
/etc/postfix/access

It's a bit dangerous to list any OK in a map before reject_unauth_destination if there are *global* or *wildcard* entries.
These can cause mail to be accepted where it may not be otherwise.

Second,
Get rid of any wildcard aliases in hash:/etc/postfix/aliases. They cause more problems then they are worth and let Backscatter clog your server even more.

Third, you are repeating checks unnecessarily.
Because of this, /etc/postfix/rbl_client_exceptions is never checked when you like to because all hosts were already blocked in smtpd_client_restrictions. Also, if /etc/postfix/rbl_client_exceptions is not a full IP, hash will not work on networks, but a cidr table type may.

Try one (1) of the following instead.
Example 1 (using similar classes):

smtpd_client_restrictions = check_client_access hash:/etc/postfix/access, check_client_access hash:/etc/postfix/client_checks, permit_mynetworks, reject_unknown_client, check_client_access hash:/etc/postfix/rbl_client_exceptions, reject_rbl_client zen.spamhaus.org

smtpd_helo_restrictions = permit_mynetworks, check_helo_access hash:/etc/postfix/helo.regexp, reject_non_fqdn_hostname, reject_invalid_hostname

smtpd_recipient_restrictions = permit_mynetworks, reject_unauth_destination, reject_non_fqdn_recipient, reject_unknown_recipient_domain

smtpd_sender_restrictions = check_sender_access hash:/etc/postfix/sender_checks, permit_mynetworks, reject_non_fqdn_sender, reject_unknown_sender_domain

Example 2(combined checks at RCPT time):
(delete smtpd_client_restrictions, smtpd_helo_restrictions and smtpd_sender_restrictions)

smtpd_recipient_restrictions = check_client_access hash:/etc/postfix/client_checks, check_sender_access hash:/etc/postfix/sender_checks, check_client_access hash:/etc/postfix/access, permit_mynetworks, reject_unauth_destination, reject_unknown_client, check_helo_access hash:/etc/postfix/helo.regexp, reject_invalid_hostname, reject_non_fqdn_sender, reject_non_fqdn_recipient, reject_unknown_sender_domain, reject_unknown_recipient_domain, check_client_access hash:/etc/postfix/rbl_client_exceptions, reject_rbl_client zen.spamhaus.org

(End examples)

Again, please check the maps before "permit_mynetworks, reject_unauth_destination" carefully before allowing clients blindly. Example 1 is less vulnerable to mistakes but slightly harder to read through all the checks.

Brian
Please I need some guidance because I don't know how to stop this

Thanks in advanced

Reply via email to