On 08.02.21 16:27, Eugene Podshivalov wrote:
Have read through the postscreen documentation closely and got it setup and
running already, but could not find the three major possibilities provided
by the tcp wrappers:
1. block by hostname
2. block clients with unknown hostname
3. block clients with invalid address<->name mapping

The last two produce the major bulk of spambot connections.

Are there any other means to achieve these?

you can block these at smtpd level.
Postscreen doesn't (and won't) check for reverse hostname.

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"The box said 'Requires Windows 95 or better', so I bought a Macintosh".

Reply via email to