On 12 Jan 2019, at 15:58, Nick Howitt wrote:

On 12/01/2019 16:42, @lbutlr wrote:
On 12 Jan 2019, at 07:52, Nick Howitt <n...@howitts.co.uk> wrote:
Unfortunately I don't have access to the MX Backup service. It is provided by my DNS provider.
Honestly, you should not have an MX server outside of your control.

If your server is routinely down for several days, then you shouldn't be running your own server.

OK. Let's assume I don't have an MX Backup. Then all 30k+ attempted spam deliveries would have come straight to me.

Not necessarily. There are spammers who use backup MXs intentionally to scam their own customers, since they can show "successful" deliveries without regard to what ultimately happens to the messages. There is also the possibility that this is an intentional backscatter-flood attack on the putative senders, using your backup MXs to bounce a flood of junk at them.

They would all have failed, initially because of unknown recipient, then, when I added them to the access list, because of an denied sender. What is the most efficient way of blocking these messages? Can they be blocked earlier than smtpd_sender_restrictions?

Maybe.

If you use postscreen's pre-greeting data detection and a suitable set of DNSBLs it is likely (if this is mostly spambots, which seems likely) that you can keep a large fraction of them from ever talking to a real smtpd

--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Available For Hire: https://linkedin.com/in/billcole

Reply via email to