Marky Yehezkiel (SNC) a écrit :
> Hi all,
> 
> I have problem with spam that pretending me ( using my account email )
> to send spam (Viagra etc ) to my self,
> 
> I have tested to http://verify.abuse.net/cgi-bin/relaytest ,
> http://www.spamhelp.org/shopenrelay/shopenrelaytest.php
> 
> and
> http://www.antispam-ufrj.pads.ufrj.br/cgi-bin/test-relay.cgi?host_to_test=203.80.8.42
> 
> 
>  
> 
> result was my mail server is not open relay.
> 
> Here is one of header email that spam pretending as my self to send
> email to me :
> 
>  
> 
> Received: from smtp.satnetcom.com ([127.0.0.1])
> 
>                 by localhost (smtp.satnetcom.com [127.0.0.1])
> (amavisd-new, port 10024)
> 
>                 with ESMTP id nYW-uhh-ygdz for <ma...@satnetcom.com>;
> 
>                 Fri, 12 Dec 2008 13:04:31 +0800 (CIT)
> 
> Received: from amc.bn.to (unknown [85.132.106.26])

the IP is listed in zen.spamhaus.org (among other lists).

> [snip]
> 
> And also I tested to mail server of one from this member milis and it
> was sent ( I do apologize that I dare to test it ) .
> 

No problem, but next time put an explicit message saying who is testing
what.

your test mail was successfully delivered. Up so far, I didn't find the
need to block mail forging my address.

> My question is, is there any way to stop this problem ? one of method
> that I know is SPF but consequence is we have to
> 
> Use smtp auth (sasl) to use it if we are not at our network.
> 
>  
> 
> Please advise from you all if there is any way to stop this. Thank you
> 

start by using
        reject_invalid_helo_hostname
        reject_non_fqdn_helo_hostname
        reject_rbl_client zen.spamhaus.org

only try other approaches if this is not enough.

Reply via email to