Jack put forth on 11/2/2010 3:56 PM:

> I'm just checking all my spam settings on my postfix servers and I wanted to
> know if anyone is using any newer RBL's than below?
> 
> (which have a low false positive rate)

Low FP noted, FSVO "low FP".

>    reject_rbl_client zen.spamhaus.org,
>    reject_rbl_client bl.spamcop.net,
>    reject_rbl_client psbl.surriel.com,
>    reject_rbl_client ix.dnsbl.manitu.net,
>    reject_rbl_client b.barracudacentral.org,

This response may be a little more than what you're asking for, but if
you implement of all of these suggestions you may be pleasantly
surprised by how little spam you see afterward. :)

That's probably plenty you have there already.  In fact it may be too
many.  I'd suggest analyzing your logs and eliminating any of those that
aren't catching anything regularly.  You've got a lot of overlap there,
each successive query having less and less of a chance to do you any
good, at the cost of 5 dns lookups per inbound ham.  I did such an
analysis over a year ago and cut my reject_rbl_client config from 6 to
only 2 dnsbls.  Currently I use zen and surriel and they don't even
catch much due to the rest of my A/S config, although zen catches more
than surriel.  YMMV and all that.

I suggest you try out the following as well and see what results you
get.  The DBL should catch a bit of pesky snowshoe spam that the dnsbl
combo above does not:

        reject_rhsbl_client dbl.spamhaus.org
        reject_rhsbl_sender dbl.spamhaus.org
        reject_rhsbl_helo dbl.spamhaus.org

You may also consider implementing Sahil Tandon's header check tcp
server daemon which also catches a fair amount of snowshow and other
spam.  It checks the from, message-id, and reply-to headers against
Spamhaus DBL, SURBL, and URIBL.  Instructions for using it are comments
in the perl file itself.

http://people.freebsd.org/~sahil/scripts/checkdbl.pl.txt

And, as always, for performance and other reasons, you should be using a
local dns resolver, not your ISP's, for dns queries originating from
your Postfix server.  If you're not already using a local resolver I
recommend you install a caching resolver directly on the Postfix server
and change your /etc/resolv.conf to "nameserver 127.0.0.1".  You may
need to restart Postfix for this change to take effect, especially if
running in a chroot.  I use pdns-recursor on my Postfix host.  Combining
the rhsbl checks to dbl.spamhaus.org and the query to the same dnsbl
made by Sahil's daemon yields _four_ queries to the same destination for
the same information.  Using a local resolver cuts this to a single
remote query and 3 cached queries, decreasing your response times,
increasing Postfix performance, and decreasing the load on the dnsbl
servers and the public infrastructure.  Use something like
pdns-recursor.  It's a win for everyone, esp you.

Last, but not least important by any means (understatement), you may
wish to try out:
http://www.hardwarefreak.com/fqrdns.pcre

Implement this as:

smtpd_recipient_restrictions
        permit_mynetworks
        permit_sasl_authenticated
        reject_unauth_destination
        ...
        check_client_access pcre:/etc/postfix/fqrdns.pcre
        ...

Put it above all of your other anti-spam checks (not including the
inbuilt Postfix restrictions such as reject_unlisted_recipient) since
local table lookups are infinitely faster than dns lookups, although not
so much so if you have pdns-recursor.  This set of PCREs targets rdns
names of mostly residential broadband IPs in various countries.  It's
target is zombie spam sources.  It catches things Spamhaus' PBL doesn't
and can stop zombie spam before the CBL lists the IP, which is very
nice.  I used to frequently get hit by zombie spam here before it was
listed in CBL.  No more.  This set has pretty much put an end to that.

It has been noted that these PCREs will infrequently FP on some MTAs
sending from within ISP IP space that contains both residential and
small business customers on an ADSL or cable network.  If such cases
arise, simply whitelist the IP.  For each one of these that may occur,
you're protecting your mailbixes from thousands of zombies within the
same ADSL/cable network.

-- 
Stan

Reply via email to