L.P.H. van Belle [2016-11-16 13:59 +0100] :

> I suggest you read : 
> http://faculty.cs.niu.edu/~rickert/cf/bad-ehlo.html 
> 
> personaly i use the following. 
> smtpd_helo_restrictions =
>     permit_mynetworks,
>     check_helo_access pcre:/etc/postfix/pcre/helo.pcre
>     check_helo_access hash:/etc/postfix/overrule/allow_helo_access.map
>     reject_invalid_helo_hostname,
>     reject_non_fqdn_helo_hostname,
>     reject_unknown_helo_hostname,
>     reject_unauth_destination
> 
> and in the helo.pcre
> ## Namebase
> /^localhost$/                   554 Don't use my own hostname
> /^localhost\.localdomain$/      554 Don't use my own hostname
> /^domain\.tld$/                  554 Don't use my own domainname
> /^hostname\.domain\.tld$/      554 Don't use my own hostname
> 
> ## IP Based
> /^127\.0\.0\.1$/                554 Don't use my own IP address
> /^\[127\.0\.0\.1\]$/            554 Don't use my own IP address
> /^\:\:1$/                       554 Don't use my own IP address
> /^\[\:\:1\]$/                   554 Don't use my own IP address
> /^\1\.2\.3\.4$/         554 Don't use my own IP address
> 
> And change domain.tld to you domain. 
> Here you need all names know to you server ( for accepting mail ) 
> And change ip 1.2.3.4 to you ip. 
> 
> The allow_helo_access.map is use for anoying customers to allow them. 
> I give them 2 weeks to fix there setup. 
> Also due to changes in dutch law, im oblgated to check the helo for 
> correctness. 
> 
> Normaly i just refer to these links.  
> rfc2821 section-3.6 en 4.1.1.1 en 10.3 en  rfc5321 section 2.3.5)
> https://www.ietf.org/rfc/rfc2821.txt
> https://www.ietf.org/rfc/rfc5321.txt
> 
> and lots of misconfigured exchange server ( most the .local domains ) 
> https://technet.microsoft.com/EN-US/library/jj657457(v=exchg.150).aspx 
> Lots of them forget to adjust the outgoing smtp connectos. 
> 
> And best of all. ( to avoid spam ) the use of postscreen. 
> Example: 
> ### Before-220 tests (postscreen / DNSBL)
> postscreen_greet_banner         = $myhostname, checking blacklists, please 
> wait.
> postscreen_greet_wait = 3s
> postscreen_greet_ttl = 2d
> postscreen_access_list          =
>     permit_mynetworks,
>     cidr:/etc/postfix/cidr/postscreen_whitelist_access.cidr,
>     cidr:/etc/postfix/cidr/drop.spamhaus-lasso.cidr
> postscreen_dnsbl_reply_map      = 
> pcre:/etc/postfix/pcre/postscreen_dnsbl_reply_map.pcre
> postscreen_blacklist_action     = drop
> postscreen_dnsbl_action         = enforce
> postscreen_greet_action         = enforce
> postscreen_dnsbl_ttl            = 2h
> postscreen_dnsbl_threshold      = 4
> postscreen_dnsbl_sites =
>         b.barracudacentral.org*4
>         bad.psky.me*4
>         zen.spamhaus.org*4
>         dnsbl.cobion.com*2
>         bl.spameatingmonkey.net*2
>         fresh.spameatingmonkey.net*2
>         dnsbl.anonmails.de*2
>         dnsbl.kempt.net*1
>         dnsbl.inps.de*2
>         bl.spamcop.net*2
>         dnsbl.sorbs.net*1
>         spam.dnsbl.sorbs.net*2
>         psbl.surriel.com*2
>         bl.mailspike.net*2
>         rep.mailspike.net=127.0.0.[13;14]*1
>         bl.suomispam.net*2
>         bl.blocklist.de*2
>         ix.dnsbl.manitu.net*2
>         dnsbl-2.uceprotect.net
>         hostkarma.junkemailfilter.com=127.0.0.3
>         hostkarma.junkemailfilter.com=127.0.0.[2;4]*2
>         # whitelists
>         swl.spamhaus.org*-4
>         list.dnswl.org=127.0.[0..255].[2;3]*-1
>         rep.mailspike.net=127.0.0.[17;18]*-1
>         rep.mailspike.net=127.0.0.[19;20]*-2
>         hostkarma.junkemailfilter.com=127.0.0.1*-1
> 
> At this moment the antispam server behind this postfix setup, 
> is 99.7% spam free. 
> A good check for rbl servers : http://multirbl.valli.org/ 

Thanks for sharing your configuration and links. All very helpful
-- and multirbl.valli.org is a great tool!

    Niklaas

Reply via email to