On 4/1/2011 1:33 PM, Vernon A. Fort wrote:
On Fri, 2011-04-01 at 13:17 -0500, Noel Jones wrote:
On 4/1/2011 11:36 AM, Drizzt wrote:
On 2011-04-01 11:22:04 (-0500), Vernon A. Fort<vf...@provident-solutions.com>   
wrote:
I'm trying to find a way to block/reject inbound messages forging our
internal email addresses.  Meaning their inbound messages using MY email
address but there not originating from my server.

a quick example:

# main.cf
smtpd_recipient_restrictions =
    permit_mynetworks
# NOTE: remove the next line if not using SASL
    permit_sasl_authenticated
    reject_unauth_destination
    check_sender_access hash:/etc/postfix/sender_access
    ... other local checks ...

    -- Noel Jones

This check the envelope sender, correct?  The Return-path: is an
external address.  Its the From: in the message header i am battling
with.  I assume its a header_check but it would have to be some for of
IF<my address>  AND NOT received from mynetworks, REJECT.

its spam and the FROM and TO are identical, i.e. from me and to me.

Vernon


No, checking the From: header will have a very high false positive rate, such as your posts to this and other mail lists.

You can use something like that in SpamAssassin as a low-scoring rule or part of a meta rule that matches other spam signs.



  -- Noel Jones

Reply via email to