On 2021-02-04 09:08, ludic...@gmail.com wrote:
new MS Azure Cloudapp Spam Wave these days.
Just a few hosts, but a lot of Spam. There is a pattern there, they
all use
Return-Path: <MAILER-DAEMON>
to disguise as a bounce and bypass any further checks.
So the PCRE header check
/^Return-Path: <MAILER-DAEMON>/ REJECT Forged Return-Path
does not catch.
Any other chance of making this work in postfix checks?
Actually a re-visit to my topic about MS Azure Cloud Spam from
December, but
much more clarified matters now after some time of observation.
On 04.02.21 21:16, Christian Kivalo wrote:
Add postscreen to your config. Postscreen stopped that spam wave with
high DNSBL ranks for me.
while I support using postscreen, I'm not sure it would be able to catch
backscatter, becsuse backscatter often comes from servers who properly
follow SMTP RFCs.
This http://rob0.nodns4.us/postscreen.html is a good ressource and i
have it setup more or less the way described there + some minor
adjustments needed for my setup.
I would recommend starting with http://www.postfix.org/POSTSCREEN_README.html
to understand what those options mean.
I think barracudacentral is subscription-only.
--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
M$ Win's are shit, do not use it !