> What is the best way to filter OUTgoing mail for spam?
> 
>  
> 
> I have postfix with postgrey and quite a few rbl lists and restrictions.
> 
>  
> 
> Unfortunately this only takes care of some spam.
> 
>  
> 
>  
> 
> We have a network where sometimes clients pc's can get infected and we 
> want to avoid sending spam!
> 
>  
> 
>  
> 
> Advice welcome!
> 

>First, don't allow any client machines to send mail directly 
>to the internet.  Block outgoing connections to port 25 at 
>your firewall or router, allowing only official mail servers.

This we cannot do as we are a small WISP and many clients need to connect
directly to there own mail servers.
What we have done is force all outgoing mail through our server for relaying
for control and logging at least.

>The best way to stop spam being sent from your mail server is 
>to require your users to authenticate when sending mail (and 
>maybe only accept from them on the "submission" port) and 
>require that the MAIL FROM matches the credentials used.  This 
>stops current viruses from successfully sending any mail. 
>This does take some work to set up, and requires additional 
>software - either dovecot or cyrus - to handle the authentication.
>http://www.postfix.org/SASL_README.html
>http://www.postfix.org/postconf.5.html#reject_authenticated_sender_login_mi
smatch
>http://www.postfix.org/postconf.5.html#smtpd_sender_login_maps

Although it's a bit outdated we use pop-before-smtp, but here again we need
to "trust" internal users to allow them to relay to be able
To use there own servers without needing even a valid e-mail account from
us.

>Or as a minimum you can require mail leaving your network to 
>use your own MAIL FROM.  This will block spam that forges the 
>sender, which is most current stuff.
># main.cf
>smtpd_sender_restrictions =
>   permit_auth_destination
>   check_sender_access hash:/etc/postfix/allowed_sender_domains
>   reject

Here again we would actually hamper users from using there external mail
accounts.

>Where allowed_sender_domains lists the permitted domain names 
>with OK.  Anything else is rejected.
>example.com   OK
>example.org   OK

>Or use a policy service that limits the number of messages a 
>specific client can send.  Here's a popular one that works 
>well and has lots of other features:
>http://policyd.sourceforge.net/


That's what I thought postgrey did?

>And finally, you can run everything through SpamAssassin (and 
>maybe clamav) using a milter or a content_filter.  Here's a 
>popular, robust content_filter for controlling SA and clamav:
>http://www.ijs.si/software/amavisd/

I forgot to mension but I do use clamav with clamsmtp, however haven't got
spamassasin running as as far as I new it
Only "marks" possible spams and this wont help with outgoing mail...
Input?

>BTW, scanning mail with clam is pretty painless using the 
>clamav-milter bundled with clamav.  I would recommend 
>considering using clam regardless of what other filtering 
>methods you use.
>http://clamav.net/
>And once you have clam running, get the Sanesecurity add-on 
>signatures, which do a great job of catching those pesky 
>phishing and scam mails.
>http://sanesecurity.co.uk/clamav/usage.htm


Like I said using clamav already although going to do some reading on
sanesecuruty!
Thank You!

-- 
Noel Jones


__________ NOD32 3416 (20080904) Information __________

This message was checked by NOD32 antivirus system.
http://www.eset.com


Reply via email to