Thanks for all your answers. My first approach to just throw
away all bounces caused by senseless data entered into a web
form is obviously too naive ;-)

I guess I will go the way to collect bounces by a script and
establish an smtpd_recipient_restrictions based on this list
of bouncing addresses.

The only thing I cannot handle with this approach are bots using
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] etc. as
destination email addresses - all those addresses will bounce
and being collected, but never tried again by the bot. An IP-based
rate limiting (and all other sort of rate limiting based on clients
information) on postfix side will not work, because the clients
IP address is always 127.0.0.1 (the web application, used via a
remote browser).

So an IP-based rate limiting in the web applications logic
will be necessary - and this is really expensive, because there
are a LOT of web applications using web forms running on this
server...

Maybe there is a way to solve this on postfix side, too?
Each web application could add an additional Header "X-Sender-IP: <IP>"
(and maybe other client information) to the generated mails - this
is not too expensive to implement.

Is it possible to use postfix to define "for each value of
X-Sender-IP there are only 5 messages per day allowed" ? This would
not prevent a bot from filling the web form thousand times a day,
but postfix will not even accept 995 of these messages to be sent out...

I guess I will have to write an own policy daemon for this,
or is this possible with pure postfix configuration?

Thanks and regards
-stefan-


Reply via email to