Re: Bombarded With Spam

2017-09-27 Thread Matus UHLAR - fantomas

On 26.09.17 12:02, Kirk Bocek wrote:
Thank you Benny and Wietse. Things are better now. However I have 
lots of log entries like:


Sep 26 11:57:52 amber postfix/smtpd[11213]: NOQUEUE: reject: RCPT 
from unknown[10.0.2.1]:
554 5.7.1 : Sender address rejected: No 
Spam; from=
r...@wysina.com.tw> to= proto=SMTP helo=


Looks like sender address rejection. the error message seems to be
custom, which means you should search for check_sender_access in your config
file.
if this still applies:
https://marc.info/?l=postfix-users&m=150628487603535&w=2
then you have:
check_sender_access hash:/etc/postfix/sender_access,

which means the sender is listed in /etc/postfix/sender_access

First off, at what stage is this rejection happening? Obviously, I 
want it to happen during HELO to keep the bandwidth down.


you can't reject sender at HELO stage, because at that stage the sender is
not known yet.

Second, this server is sitting behind a firewall (10.0.2.1). Is there 
anyway to get the sending IP address instead of the firewall?


configure your firewall to do destination NAT, so you see the real
source. Hiding real source causes big problems to spam detection.

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
The 3 biggets disasters: Hiroshima 45, Tschernobyl 86, Windows 95


Backscatter questions

2017-09-27 Thread J Doe
Hello,

I recently configured Postfix 3.1.0 on a low-volume, Internet facing server.  
Mail operations are normal, but I had two questions regarding backscatter.

1. From what I understand, “backscatter” refers to e-mails such as non-delivery 
reports being sent back to the originator of a spam message.  As the originator 
is often a forged address, the non-delivery reports is essentially junk data.  
Would this be a correct definition for the term ?

2. Is it possible to white-list the generation of non-delivery reports for some 
hosts and prevent generation for all others ?  For instance, if a Gmail user 
attempts to e-mail me but specifies a non-existent address, I want the 
non-delivery report to go them (and any other senders from @gmail.com), but all 
other reports should be stopped from being sent.

Thanks for your help,

- J



Re: Backscatter questions

2017-09-27 Thread Benny Pedersen

J Doe skrev den 2017-09-27 19:49:


I recently configured Postfix 3.1.0 on a low-volume, Internet facing
server.  Mail operations are normal, but I had two questions regarding
backscatter.


...


1. From what I understand, “backscatter” refers to e-mails such as
non-delivery reports being sent back to the originator of a spam
message.  As the originator is often a forged address, the
non-delivery reports is essentially junk data.  Would this be a
correct definition for the term ?


non delivery is not correct, if you have a local sender that try to send 
email outside your own local domains it would create a bounce if it 
could not be delivered, this is not spam btw



2. Is it possible to white-list the generation of non-delivery reports
for some hosts and prevent generation for all others ?  For instance,
if a Gmail user attempts to e-mail me but specifies a non-existent
address, I want the non-delivery report to go them (and any other
senders from @gmail.com), but all other reports should be stopped from
being sent.


keep away from whitelists, since there is nothing to whitelist, but make 
sure your postfix does not accept and later bounce same mail since that 
could be with forged sender addresses


its always safe to reject

all the best


Re: Backscatter questions

2017-09-27 Thread J Doe

> On Sep 27, 2017, at 2:08 PM, Benny Pedersen  wrote:
> 
> J Doe skrev den 2017-09-27 19:49:
> 
>> I recently configured Postfix 3.1.0 on a low-volume, Internet facing
>> server.  Mail operations are normal, but I had two questions regarding
>> backscatter.
> 
> ...
> 
>> 1. From what I understand, “backscatter” refers to e-mails such as
>> non-delivery reports being sent back to the originator of a spam
>> message.  As the originator is often a forged address, the
>> non-delivery reports is essentially junk data.  Would this be a
>> correct definition for the term ?
> 
> non delivery is not correct, if you have a local sender that try to send 
> email outside your own local domains it would create a bounce if it could not 
> be delivered, this is not spam btw
> 
>> 2. Is it possible to white-list the generation of non-delivery reports
>> for some hosts and prevent generation for all others ?  For instance,
>> if a Gmail user attempts to e-mail me but specifies a non-existent
>> address, I want the non-delivery report to go them (and any other
>> senders from @gmail.com), but all other reports should be stopped from
>> being sent.
> 
> keep away from whitelists, since there is nothing to whitelist, but make sure 
> your postfix does not accept and later bounce same mail since that could be 
> with forged sender addresses
> 
> its always safe to reject
> 
> all the best

Hi Benny,

Thank you for your reply.

My current setup is for virtual domain hosting.  I have a domain (say 
example.org), that I forward e-mail to Gmail.  So if there was j...@example.org 
Postfix forwards to jons_em...@gmail.com.  As a result, the only local users I 
have are the service accounts on the e-mail server itself.

What happens is I will get a spam message for a user @example.org.  If the user 
is non-existent, a non-delivery report gets generated by mail server and goes 
back to the sender of the spam . . . whose address is likely forged.  That 
means the report is generating traffic to a possibly legitimate e-mail server.

I do want legitimate non delivery reports to go to real people e-mailing 
recipients @example.org.  Almost all of the legitimate e-mail coming through is 
from people using Gmail, Outlook and so forth which is why I thought 
whitelisting those domaines for non delivery reports would be useful, whereas 
other servers are most likely forged and should be silently dropped.

Is there a way to achieve this or as you noted, are whitelists to be avoided ?  
If whitelists are to be avoided what is the best practice for handling this 
scenario ?

Thanks,

- J


Re: Backscatter questions

2017-09-27 Thread Benny Pedersen

J Doe skrev den 2017-09-27 22:20:

[snip]

Is there a way to achieve this or as you noted, are whitelists to be
avoided ?  If whitelists are to be avoided what is the best practice
for handling this scenario ?


why not add example.org on google apps mx ? :=)

if useers not wanting your mailserver anyway, why even think about imap 
then ?


still serious ?, then setyp postfix client sasl auth to gmail pr user

if not want all that problems drop forwards


RE: RESOLVED: RE: wrong From: and Return Path: address

2017-09-27 Thread Michael Fox
> > On Sep 26, 2017, at 11:23 PM, Michael Fox  wrote:
> >
> > BTW, the mail provider found that the default sendmail config and their
> own
> > customized config both rewrote the From: header when the From: address
> was
> > for a domain that had a CNAME record.  They said this is a config option
> in
> > sendmail and they prefer to operate this way.  Interesting that my other
> > Postfix machines don't do this, nor do many other large email providers.
> 
> This is an obsolete option in Sendmail that violates decades old SMTP
> standards, CNAME canonicalization of recipient domains went away in
> RFC 2821 and there are many email domains that are aliases where the
> mailbox address is expected to remain unmangled by CNAME expansion of
> the domain part.  The operators of the sending system are stuck in the
> distant past.

Thanks Viktor.  Yes, I see section 3.6 now explicitly allows "CNAME RRs
whose targets can be resolved, in turn, to MX or A RRs", which was the case
in my situation.

Good to know that Postfix does it better!

Michael




Re: RESOLVED: RE: wrong From: and Return Path: address

2017-09-27 Thread Viktor Dukhovni
On Wed, Sep 27, 2017 at 07:00:39PM -0700, Michael Fox wrote:

> > This is an obsolete option in Sendmail that violates decades old SMTP
> > standards, CNAME canonicalization of recipient domains went away in
> > RFC 2821 and there are many email domains that are aliases where the
> > mailbox address is expected to remain unmangled by CNAME expansion of
> > the domain part.  The operators of the sending system are stuck in the
> > distant past.
> 
> Thanks Viktor.  Yes, I see section 3.6 now explicitly allows "CNAME RRs
> whose targets can be resolved, in turn, to MX or A RRs", which was the case
> in my situation.
> 
> Good to know that Postfix does it better!

Even Sendmail does it better in default and recommended configurations,
the users in question are deliberately choosing to continue no longer
sound practices.

-- 
Viktor.