On 4-Apr-2009, at 16:02, Noel Jones wrote:
Best in smtpd_data_restrictions so you don't reject sourceforge and
others sender verification probes.
Is there anything I need to be concerned about having/not having in
smtpd_data_restrictions? it is currently commented out. if I simply
put:
smtpd_data_restrictions =
reject_unauth_pipelining,
reject_rbl_client ips.backscatterer.org,
reject_rbl_client bl.spamcannibal.org
permit
is that good enough? (the pipelining was there before in the
commented out declaration along with the permit). I am sad to say I am
still a little unclear about how the various smtpd_mumble_restrictions
work together.
IP you've provided as source of backscatter is listed in
backscatterer.org.
Moreover, SPF won't help you much, because other mailserver admins
would have to check it, and it's rarely supported.
True. It "seems" that sites with SPF are less frequently chosen as
joe-job victims, but there's no guarantee. At any rate, adding SPF
shouldn't hurt anything.
Well, I am hoping spf helps a bit. I'd left off the ~all on some
domain's configuration and I've noticed a lot os this backscatter has
Received-SPF: neutral (mail9.webair.com: 85.9.127.134 is neither
permitted nor denied by SPF record at kreme.com)
Other suggestions...
Add the header_checks suggested in
http://www.postfix.org/BACKSCATTER_README.html
Note the examples will need to be "customized" for your site.
Oh, those look like a good idea in general, backscatter or not. At
least in the header_checks. I am leery of running body_checks as it
seems those would be expensive.
If you're using SpamAssassin, the VBOUNCE rules are helpful.
Yeah, but SA is run after reception. I'd rather reject backscatter
than discard it, if possible.
Thanks, this is great info.
--
I'll trade you 223 Wesley Crushers for your Captain Picard