Chris Funk a écrit :
> Hi All,
> 
> I am getting a lot of spam with forged addresses in the From: header.
> They are forging it with our domain addresses.  Here is an example:
> 
> Received: from localhost (localhost.localdomain [127.0.0.1
> <http://127.0.0.1>]) by
>  mail.us-reports.com <http://mail.us-reports.com> (Postfix) with ESMTP
> id 391E716C11F for
>  <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>; Thu, 4 Dec 2008
> 08:40:55 -0700 (MST)
> X-Virus-Scanned: amavisd-new at us-reports.com <http://us-reports.com>
> Received: from mail.us-reports.com <http://mail.us-reports.com>
> ([127.0.0.1 <http://127.0.0.1>]) by localhost
>  (mail.us-reports.com <http://mail.us-reports.com> [127.0.0.1
> <http://127.0.0.1>]) (amavisd-new, port 10024) with ESMTP id
>  dBAU+DdeGeQd for <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>;
> Thu, 4 Dec 2008 08:40:50 -0700
>  (MST)
> Received: from 88-109-126-174.dynamic.dsl.as9105.com
> <http://88-109-126-174.dynamic.dsl.as9105.com>
>  (88-109-126-174.dynamic.dsl.as9105.com
> <http://88-109-126-174.dynamic.dsl.as9105.com> [88.109.126.174
> <http://88.109.126.174>]) by
>  mail.us-reports.com <http://mail.us-reports.com> (Postfix) with SMTP id
> 4541F16C135 for
>  <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>; Thu, 4 Dec 2008
> 08:40:35 -0700 (MST)
> To: <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>
> Subject: Your Order
> From: <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>
> MIME-Version: 1.0
> Importance: High
> Content-Type: text/html
> Message-ID: <[EMAIL PROTECTED]
> <mailto:[EMAIL PROTECTED]>>
> Date: Thu, 4 Dec 2008 08:40:35 -0700
> Return-Path: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>
> 
> Here is the result of postconf | grep restrict
> 
> [EMAIL PROTECTED] postfix]# postconf | grep restrict
> 
> smtpd_client_restrictions =
> 
> smtpd_data_restrictions = reject_unauth_pipelining
> 
> smtpd_end_of_data_restrictions =
> 
> smtpd_etrn_restrictions =
> 
> smtpd_helo_restrictions = permit_mynetworks, 
>  permit_sasl_authenticated, 
>  check_helo_access hash:/etc/postfix/helo_access, reject_invalid_hostname, 
>  reject_non_fqdn_hostname, permit
> 
> smtpd_recipient_restrictions = permit_mynetworks, 
>  permit_sasl_authenticated, 

put
        reject_unauth_destination
here.

>  check_sender_access hash:/etc/postfix/sender_access, 
>  reject_non_fqdn_recipient, 
>  reject_unknown_recipient_domain, 
>  reject_rbl_client sbl.spamhaus.org 

if you used zen.spamhaus.org instead, the spam would have been
blocked... the IP is litsed in xbl.

you can also use check_client_access to block
.dynamic.dsl.as9105.com REJECT blah blah



>  reject_rbl_client list.dsbl.org, 

dsbl is gone since some time now. please remove it from your configuration.

>  reject_unauth_pipelining, 

reject_unauth_pipelining is useless here. put it under
smtpd_data_restrictions.

>  reject_unauth_destination
> 
> smtpd_restriction_classes =
> ***********************************************
> /etc/postfix/sender_access
> 
> us-reports.com <http://us-reports.com>   554   SPAM
> 
> my.ip.add.res   554   SPAM
> 
> I tried setting up a header check that rejected anything from
>  *.us-reports.com <http://us-reports.com> in the From:  
> 
> Obviously not a good thing to do as then no one internally could send mail.
> 

and you would reject mailing lists, which is bad...

> Is there anything I can do that would say,  If the From: address is
> [EMAIL PROTECTED] <http://us-reports.com> and it is not from mynetworks
> then REJECT it?
> 

no. you could write a milter or a proxy_filter, but I don't think this
is worth the pain.

> The check_sender_access option is working great for the MAIL FROM:
> header, but that isn't catching these other ones.
> 
> Thanks for any pointers on this.
> 
> Postfix version 2.2.10
> 
> Chris
> 

Reply via email to