Mark Watts put forth on 3/10/2011 9:57 AM:

> I'm already using three RBL's (b.barracudacentral.org, zen.spamhaus.org
> and dnsbl.sorbs.net) yet I'm still seeing a fair amount of spam coming
> in from Russian and Romanian IP ranges that isn't blocked.

It would be helpful if you posted your 'postconf -n' output so we can
make sure you have all the standard Postfix anti UCE controls enabled.
In the mean time, give this a go:
http://www.hardwarefreak.comf/fqrdns.pcre

Simple to implement.  Usage instructions are at the top of the file.  It
targets dynamic IP hosts and some others that simply shouldn't be
sending SMTP mail directly.  It stops quite a bit that Zen (CBL+PBL),
SORBS DUL, and other DNSBLs miss.  It's a simple PCRE table consisting
of 1600+ regular expressions that matche rDNS strings of undesirable
hosts.  Myself and a few others on this list use it with good results.
It's not magic, but just another good tool to have in your AS arsenal.

You may also want to give this a go:
http://people.freebsd.org/~sahil/scripts/checkdbl.pl.txt

It scans mail headers for domains and checks them against 3 URI/domain
based DNSBLs.  These are user configurable, so you can add more
URI/domain DNSBLs if you wish.  Do NOT use IP based DNSBLs with this,
only URI/domain DNSBLs.

I'd use both of the above tools regardless of the Russian/Romanian spam
problem.  And if you absolutely will never receive mail from these
countries, or very infrequently, using ipdeny.com as Wietse mentioned is
a sure fire way to block the entire country.  I use it myself against
Russia, Romania, China, Korea, Malaysia, and a few others.  If you do
this it's a good idea to implement the dnswl.org whitelist:

http://www.dnswl.org

Postfix > 2.8 can query DNSWL directly.  For earlier versions you'll
need to get permission to rsync the data file.  You'll need to run it
through a script to add "permit_auth_destination" to each IP line
transforming it into a CIDR table.

I can give you the script I use if you need it.

-- 
Stan

Reply via email to