Am 11.06.2010 19:31, schrieb Jeroen Geilman: > On 06/11/2010 04:40 PM, motty.cruz wrote: >> >> >> >> >> >> *From:* owner-postfix-us...@postfix.org >> [mailto:owner-postfix-us...@postfix.org] *On Behalf Of *Jeroen Geilman >> *Sent:* Thursday, June 10, 2010 4:02 PM >> *To:* postfix-users@postfix.org >> *Subject:* Re: how to stop backscatter without check headers >> >> >> >> On 06/11/2010 12:44 AM, motty.cruz wrote: >> >> Is there a best way to stop backscatter spam without using check >> headers? Traffic is too heavy to user check headers + we received >> email for three different domains. >> >> Using postfix 2.6. >> >> >> >> Thanks, >> >> motty >> >> >> To stop backscatter spam, don't accept mail you cannot deliver. >> >> That is a very smart answer, please pardon my stupidity. >> >> >> Header_checks are trivially spoofed. >> >> J. >> >> Spammers spoof the “from” and gets redirected to “user” in my domain? >> How do you fight that? >> > > I don't understand what you mean. > If spammers spoof the envelope sender, header_checks will not help you. > If spammers spoof the sender header, well, postfix doesn't look at From: > headers. > > J. > >> From: Mail Delivery Subsystem [mailto:mailer-dae...@smtp.newsguy.com] >> >> Sent: Thursday, June 10, 2010 1:28 AM >> >> To: u...@obscure.com >> >> Subject: Returned mail: see transcript for details >> >> >> >> The original message was received at Thu, 10 Jun 2010 01:28:19 -0700 >> (PDT) from [124.217.198.141] >> >> >> >> ----- The following addresses had permanent fatal errors ----- >> <eri...@newsguy.com> >> >> (reason: Can't create output) >> >> >> >> ----- Transcript of session follows ----- 550 5.0.0 >> <eri...@newsguy.com>... Can't create output >> >> >> >> >> >
hi, you can do it like this, but think and analyse your logs and setup before, dont simple copy paste i.e smtpd_sender_restrictions = reject_unknown_sender_domain, reject_non_fqdn_sender, permit_mynetworks, check_sender_access hash:/etc/postfix/sender_backscatter_access, --- /etc/postfix/sender_backscatter_access Symantec_Mail_Security_for_SMTP@ backscatter Gateway_SMTP@ backscatter Notify_nav_gateways@ backscatter <> backscatter postmaster@ backscatter MAILER-DAEMON@ backscatter devnull@ backscatter MDaemon@ backscatter imsspostmaster@ backscatter Administrator@ backscatter imss@ backscatter majordomo@ backscatter symantec_antivirus_for_smtp_gateways@ backscatter Mail_Security_for_SMTP@ backscatter FETCHMAIL-DAEMON@ backscatter NULL@ backscatter ------ smtpd_restriction_classes = ...., backscatter, .... ----- from here you may use rbls and/or a list of your well known backscattered recipients or match it only to your daily backscatter ips etc, many combinations are possible, keep care that they make sense rejecting valid bounce mails i.e from <> may loose you urgent debug info backscatter = permit_mynetworks, permit_sasl_authenticated, reject_rbl_client zen.spamhaus.org, check_recipient_access hash:/etc/postfix/backscatter_recipient_access Again attention , you should analyse your logs and setup to match setup like this to your needs -- Best Regards MfG Robert Schetterer Germany/Munich/Bavaria