Paweł Leśniak wrote:
W dniu 2009-04-04 20:09, LuKreme pisze:
I've seen an increase in backscatter emails recently. Perfectly valid
headers (AFAICT)
Return-Path: <>
...
Not surprising, since the message is sent by a real MTA.
Is there some sort of strategy I can implement that will reject a good
portion of these kinds of messages? What are other people doing to
deal with backscatter? I read up on SRS, but it doesn't sound like a
great idea.
I'd recommend using rbl checks specified for this:
backscatter.map:
<> reject_rbl_client ips.backscatterer.org, reject_rbl_client
bl.spamcannibal.org
Good suggestion. This will reject bounces from known
backscatter sources.
postmaster reject_rbl_client ips.backscatterer.org, reject_rbl_client
bl.spamcannibal.org
MAILER-DAEMON reject_rbl_client ips.backscatterer.org, reject_rbl_client
bl.spamcannibal.org
These two will never match anything. With a little adjustment
they *might* be useful in a PCRE map.
Add
check_sender_access hash:/etc/postfix/backscatter.map
at the very last of RBLs in smtpd_recipient_restrictions (or other
restrisctions if you prefer). For sure you should also read info on
those blacklists.
Best in smtpd_data_restrictions so you don't reject
sourceforge and others sender verification probes.
IP you've provided as source of backscatter is listed in backscatterer.org.
Moreover, SPF won't help you much, because other mailserver admins would
have to check it, and it's rarely supported.
True. It "seems" that sites with SPF are less frequently
chosen as joe-job victims, but there's no guarantee. At any
rate, adding SPF shouldn't hurt anything.
Other suggestions...
Add the header_checks suggested in
http://www.postfix.org/BACKSCATTER_README.html
Note the examples will need to be "customized" for your site.
If you're using SpamAssassin, the VBOUNCE rules are helpful.
If you're using amavisd-new, it has some bounce-killer
features that might help. Check amavisd-new release notes for
details. IIRC this is part of the "penpals" feature of
amavisd-new.
If you're using clamav, the Sanesecurity addon signatures kill
some common backscatter.
If all else fails and your system is drowning, it might not be
unreasonable to TEMPORARILY reject all mail from the null
sender. This is a last resort measure and will reject legit mail.
-- Noel Jones