On 2021-02-04 09:08, ludic...@gmail.com wrote:
new MS Azure Cloudapp Spam Wave these days.

Just a few hosts, but a lot of Spam. There is a pattern there, they all use

Return-Path: <MAILER-DAEMON>

to disguise as a bounce and bypass any further checks.

So the PCRE header check

/^Return-Path: <MAILER-DAEMON>/   REJECT Forged Return-Path

does not catch.

Any other chance of making this work in postfix checks?

Actually a re-visit to my topic about MS Azure Cloud Spam from December, but
much more clarified matters now after some time of observation.

On 04.02.21 21:16, Christian Kivalo wrote:
Add postscreen to your config. Postscreen stopped that spam wave with high DNSBL ranks for me.

while I support using postscreen, I'm not sure it would be able to catch
backscatter, becsuse backscatter often comes from servers who properly
follow SMTP RFCs.

This http://rob0.nodns4.us/postscreen.html is a good ressource and i have it setup more or less the way described there + some minor adjustments needed for my setup.

I would recommend starting with http://www.postfix.org/POSTSCREEN_README.html
to understand what those options mean.
I think barracudacentral is subscription-only.


--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
M$ Win's are shit, do not use it !

Reply via email to