On 2/8/2023 12:37 PM, Rob McGee wrote:
On 2/8/2023 3:14 AM, Viktor Dukhovni wrote:
On Wed, Feb 08, 2023 at 10:00:14AM +0200, mailm...@ionos.gr wrote:
/\.top$/ REJECT
/\.xyz$/ REJECT
/\.cam$/ REJECT
/\.fun$/ REJECT
/\.buzz$/ REJECT
/\.club$/ REJECT
/\.link$/ REJECT
/\.hinet\.net$/ REJECT
Why everyone feels they need regular expressions for this is a mystery.
/etc/postfix/sender-access:
top REJECT I employ crude anti-spam measures
.top REJECT I employ crude anti-spam measuressnip
Very good post as always, but there was a typo. Here's a regexp (!) to
fix it:
s/crude/crude and ineffective/g
HTH :)
Those of you doing this should refer back to Viktor's previous post.
This is a bad idea: it won't really do much against spam and could
easily block non-spam. Again, none of these TLDs employ any tests to
ensure that registrants are spammers.
Something I have noticed recently: many times the envelope and header
sender addresses differ. It's an easy way for large-scale hosting
operations to manage their own DKIM keys. I saw this with Amazon
Workmail hosting.
Google Workspace hosting always uses the single account name as the
envelope sender, so when multiple domains are configured in the same
company account, each user always has the same envelope sender,
regardless of the header sender.
Here's a rule of thumb: if you think you can do much about spam based
on sender addresses, whether envelope or header: you're wrong.
I would prefer to quarantine rather than reject, if I can figure out how
to do that. I would at least be able to look through them periodically
and see if something is legit.
I suddenly started getting these (.store,.shop, etc) a could days ago.
They are all coming from this block of addresses: 107.182.131.0.