On 2018-May-05 20:54, Bill Cole wrote:
> Try reject_unknown_reverse_client_hostname first. It is safer than
> reject_unknown_client_hostname. It won't catch the specific miscreant in
> your log but unlike reject_unknown_client_hostname it won't block random
> outbound IPs of major mailbox providers.

I set reject_unknown_reverse_client_hostname and will see how that goes.

> I'm not sure why this specific mail is getting through but looking at your
> config I have a few suggestions:
> 
> 1. Configure postscreen to run in front of smtpd with main.cf settings
> something like this:
> 
> postscreen_access_list = permit_mynetworks
> postscreen_disable_vrfy_command = yes
> postscreen_dnsbl_action = enforce
> postscreen_dnsbl_sites = zen.spamhaus.org=127.0.0.2*2
>     zen.spamhaus.org=127.0.0.3*2 zen.spamhaus.org=127.0.0.4*2
>     zen.spamhaus.org=127.0.0.10*2 zen.spamhaus.org=127.0.0.11*2
>     psbl.surriel.com=127.0.0.2*1 ix.dnsbl.manitu.net=127.0.0.2*1
> postscreen_dnsbl_threshold = 2
> postscreen_dnsbl_ttl = 10m
> postscreen_greet_action = drop
> 
> (Adjust the postscreen_dnsbl_sites to taste...)
> 
> 2. If you don't enable postscreen, AT LEAST fix this:
> 
> smtpd_client_restrictions = reject_rbl_client sbl.spamhaus.org,
> reject_rbl_client blackholes.easynet.nl
> 
> The "blackholes.easynet.nl" DNSBL has been dead for many years, so you
> should remove it.  Also, while "sbl.spamhaus.org" is a fine DNSBL, there is
> usually no reason for a MTA that has a separate submission service to not
> use the "zen.spamhaus.org" which includes many more problem mail sources
> including the one you've logged.
> 
> 3. To tell Aisha and other bogus "local" senders to go away:
> 
> smtpd_reject_unlisted_sender = yes

As advised, turned on postscreen, fixed DNSBL and set 
smtpd_reject_unlisted_sender to yes.
 

Reply via email to