Justin C. Le Grice a écrit :
I'm sorry if this has already been done to death but I have searched
high and low and have found scant discussion of this.
I have been running Postfix for three weeks now and have reduced spam to
just one or two messages getting through a day.
I have implemented recommended anti spam settings from a number of sites
which include HELO, RBL and DNS checks.
I am running Postfix 2.5.5 with Amavis-New on Ubuntu Server 9.04
My main.cf contains the following;
smtpd_recipient_restrictions =
permit_mynetworks,
permit_sasl_authenticated,
check_client_access hash:/etc/postfix/mywhitelist,
reject_rbl_client bl.spamcop.net,
reject_rbl_client dnsbl-1.uceprotect.net,
reject_rbl_client dnsbl-2.uceprotect.net,
uceprotect is considered too aggressive by some of us. but it's your
mail....
reject_rbl_client sbl-xbl.spamhaus.org,
replace this with zen.spamhaus.org. and while you are at it, move it up...
reject_rbl_client dnsbl.njabl.org,
reject_invalid_hostname,
reject_non_fqdn_hostname,
reject_non_fqdn_sender,
reject_non_fqdn_recipient,
reject_unknown_sender_domain,
reject_unknown_recipient_domain,
reject_unauth_destination,
move reject_unauth_destination above and above. don't lose your
resources and those of DNSBLs with mail that has no reason to come.
permit
smtpd_data_restrictions =
reject_unauth_pipelining,
permit
# Strange Syntax / Strict syntax
smtpd_helo_required = yes
strict_rfc821_envelopes = yes
#No VRFY command
disable_vrfy_command = yes
content_filter = smtp-amavis:[127.0.0.1]:10024
receive_override_options = no_address_mappings
Note: I have the RBL's first to see how effective they are. I'll
probably drop them down before the permit line at some stage.
While I am more than happy with the reduction in spam I would like to
use my log files to be proactive in letting ISPs know that they have
bots in their networks. I am presuming that most of the attempts to
connect are from bot infected home computers, judging from the FQDN that
is used in the connection.
forget about this. If ISPs wanted to detect botnets, they have a lot
more infos than you. given how they ignore our manual complaints (and I
don't compplain for "simple" spam, I only complain for "illegal"
activity, such as phishing, ...), there's no hope to see them accept
your automated ones.
I have been trying to find something that will do the following.
Analyse my mail.log file looking for occurances of rejected attempts to
connect to my mail server.
At some user defined threshold it would then do a whois query looking
for an abuse@<<originating ISP>> email address.
You're not supposed to query whois automatically. please reread whois
access policy. Fighting abuse doesn't justify your own abuse. whatever
you have in mind: whois is what whois is, not what you think it should be.
It would the send a nicely worded message detailing the attempt to use
my mail server for spamming and request that the connection be
terminated until the user fixes their compromised machine.
Boy, get back with us. those who care implement proactive measures and
don't generally need our feedback (they notice the problem because their
MTAs get a lot more junk than every recipient). the others don't really
care. they may have a "we should fix this problem before august"
project, but it doesn't say which year...
Am I just being wishful here??
yes.
Cheers
Justin