On 4/1/2011 1:33 PM, Vernon A. Fort wrote:
On Fri, 2011-04-01 at 13:17 -0500, Noel Jones wrote:
On 4/1/2011 11:36 AM, Drizzt wrote:
On 2011-04-01 11:22:04 (-0500), Vernon A. Fort<vf...@provident-solutions.com>
wrote:
I'm trying to find a way to block/reject inbound messages forging our
internal email addresses. Meaning their inbound messages using MY email
address but there not originating from my server.
a quick example:
# main.cf
smtpd_recipient_restrictions =
permit_mynetworks
# NOTE: remove the next line if not using SASL
permit_sasl_authenticated
reject_unauth_destination
check_sender_access hash:/etc/postfix/sender_access
... other local checks ...
-- Noel Jones
This check the envelope sender, correct? The Return-path: is an
external address. Its the From: in the message header i am battling
with. I assume its a header_check but it would have to be some for of
IF<my address> AND NOT received from mynetworks, REJECT.
its spam and the FROM and TO are identical, i.e. from me and to me.
Vernon
No, checking the From: header will have a very high false
positive rate, such as your posts to this and other mail lists.
You can use something like that in SpamAssassin as a
low-scoring rule or part of a meta rule that matches other
spam signs.
-- Noel Jones