SV: TLD blocking revisited

2016-09-20 Thread Sebastian Nielsen
I have had other experiences with spammers. I suspect there is different spammers out there that spam in different ways. I once got a very irritating spammer that send a lot of spam, that was completely identical, had a identical color in the header and it was really obvious this spammer was the

Re: TLD blocking revisited

2016-09-20 Thread Jim Reid
> On 21 Sep 2016, at 01:40, Sebastian Nielsen wrote: > > I would really suggest using DISCARD instead of "500 This TLD sends spam - g > e t lost.". > Thus the spammer dosen't get to know he got stuck in a spam filter and can > update their tools to bypass it. Spammers generally don’t pay that l

SV: TLD blocking revisited

2016-09-20 Thread Sebastian Nielsen
I would really suggest using DISCARD instead of "500 This TLD sends spam - g e t lost.". Thus the spammer dosen't get to know he got stuck in a spam filter and can update their tools to bypass it. DISCARD accepts the mail but throws it into /dev/null -Ursprungligt meddelande- Från: owner-

Re: TLD blocking revisited

2016-09-20 Thread lists
Tell ya what. Let's hold the suggestions here. This one looks like something I can handle. (I really need things spelled out.) BTW, the SpamAssassin enlist trick caught about 20% of this flavor of spam. But I'm really OK will killing the TLD.  I did some googling on this and some claim Baracuda

Re: TLD blocking revisited

2016-09-20 Thread Bill Cole
On 20 Sep 2016, at 16:10, li...@lazygranch.com wrote: ‎After studying these spam messages, I think postfix blocking via tld is the only solution. The problem is the message is embedded in graphics with brief text regarding "if you can't view this click here". There isn't enough to trip the spa

Re: Brute-Force countermeasures with Postfix

2016-09-20 Thread Wietse Venema
felderm: > Hi All > > We operate multiple Postfix instances behind HA-Proxies. The haproxy > upstream protocol is enabled: > > smtpd_upstream_proxy_protocol=haproxy > (the IPs of the HA-proxies are in mynetworks) You should never have to list the HA-proxies in mynetworks. If the remote connecti

Re: Brute-Force countermeasures with Postfix

2016-09-20 Thread Sean Greenslade
On Tue, Sep 20, 2016 at 12:03:37PM +0200, felderm wrote: > Hi All > > We operate multiple Postfix instances behind HA-Proxies. The haproxy > upstream protocol is enabled: > > smtpd_upstream_proxy_protocol=haproxy > (the IPs of the HA-proxies are in mynetworks) > > There are brute-force attacks a

Re: Moved Postfix to new server; Gmail now silently dropping messages sent from it

2016-09-20 Thread rightkicktech.gmail.com
Hi Alex, You should be able to see more details in /var/log/mail.log. postfix is pretty verbose in the logs. Try sending a test mail and observe the log file. Revert with the relevant entry to see what happened. On September 21, 2016 12:30:27 AM EEST, Alex Hall wrote: >Hello list, >A very qui

Re: Moved Postfix to new server; Gmail now silently dropping messages sent from it

2016-09-20 Thread Sean Greenslade
On Tue, Sep 20, 2016 at 05:30:27PM -0400, Alex Hall wrote: > > Bottom line: on one server, everything was great. On my company's virtual > server, with the same configuration, packages, and settings, mail sent out > is silently discarded by Gmail when delivered to anyone on the company's > domain.

Re: Moved Postfix to new server; Gmail now silently dropping messages sent from it

2016-09-20 Thread Viktor Dukhovni
On Tue, Sep 20, 2016 at 05:30:27PM -0400, Alex Hall wrote: > From all I can tell, Postfix is doing it right: it sends the emails, and so > long as the recipient is *not* @domain.com, the message is delivered. If it > *is* @domain.com, the message silently disappears. See http://www.postfix.o

Moved Postfix to new server; Gmail now silently dropping messages sent from it

2016-09-20 Thread Alex Hall
Hello list, A very quick intro first. I work for a company that uses all virtual servers, a change we recently adopted. I'm setting up Request Tracker for internal use, which requires a Linux system to run. Thus, I'm learning about Linux and all of RT's required packages at the same time. I'm comfo

Testing subscription, please ignore

2016-09-20 Thread Alex Hall
I'm simply making sure my subscription worked. I had some trouble getting it to go through, so want to check that I've made it on the list. -- Alex Hall Automatic Distributors, IT department ah...@autodist.com

Re: TLD blocking revisited

2016-09-20 Thread Jim Reid
> On 20 Sep 2016, at 21:10, li...@lazygranch.com wrote: > > What is the simplest way to block a TLD? Put the offending TLD in a map and have that map referenced through check_sender_access and/or check_client_access. ie in main.cf: smtpd_client_restrictions = permit_mynetworks

SV: TLD blocking revisited

2016-09-20 Thread Sebastian Nielsen
Im using the following to block TLDs, but not in helo checks, im using sender checks instead: /\.bid$/ DISCARD /\.top$/ DISCARD /\.xyz$/ DISCARD /\.pro$/ DISCARD /\.date$/ DISCARD /\.faith$/ DISCARD /\.download$/ DISCARD DISCARD blocks the mail without telling the sender the mail was blocked so

Re: TLD blocking revisited

2016-09-20 Thread @lbutlr
On Tue Sep 20 2016 14:10:17 li...@lazygranch.com said: > > ‎After studying these spam messages, I think postfix blocking via tld is the > only solution. The problem is the message is embedded in graphics with brief > text regarding "if you can't view this click here". There isn't enough

Re: TLD blocking revisited

2016-09-20 Thread Benny Pedersen
On 2016-09-20 22:10, li...@lazygranch.com wrote: ‎After studying these spam messages, I think postfix blocking via tld is the only solution. The problem is the message is embedded in graphics with brief text regarding "if you can't view this click here". There isn't enough to trip the spam bot. 

Re: TLD blocking revisited

2016-09-20 Thread lists
‎After studying these spam messages, I think postfix blocking via tld is the only solution. The problem is the message is embedded in graphics with brief text regarding "if you can't view this click here". There isn't enough to trip the spam bot.  What is the simplest way to block a TLD?

Re: Rough postscreen policy design

2016-09-20 Thread Wietse Venema
postscreen will not invoke tests for every connection, nor will it store configuration overrides in its cache. You can build your own MTA front-end, or convince some other project to build DNSBL lookups into their loadbalancer or proxy. Wietse

Re: Rough postscreen policy design

2016-09-20 Thread Jose Borges Ferreira
On Mon, Sep 19, 2016 at 7:19 PM, Wietse Venema wrote: > What you are asking for requires either that a test happens for > every connection, or the ability to store configuration overrides > in the postscreen cache. The first is not a good idea, and the > latter just adds complexity. > > The first

Brute-Force countermeasures with Postfix

2016-09-20 Thread felderm
Hi All We operate multiple Postfix instances behind HA-Proxies. The haproxy upstream protocol is enabled: smtpd_upstream_proxy_protocol=haproxy (the IPs of the HA-proxies are in mynetworks) There are brute-force attacks agains the SMTP servers (auth Backend is OpenLDAP). We would like to block t

Re: TLD blocking revisited

2016-09-20 Thread lists
‎Believe it or not, Tellus doesn't support encryption.  https://www.reddit.com/r/canada/comments/464glo/psaif_you_use_a_telus_email_account_telus_does/?st=itb9thrx&sh=2a6ed83e I think when Google starts to refuse unencrypted email, it would make sense for postfix to bounce them.   Original Mess

Re: TLD blocking revisited

2016-09-20 Thread Alice Wonder
On 09/19/2016 05:29 PM, li...@lazygranch.com wrote: The last time TLD blocking came up, the consensus of the hive was not to block based on TLD. (You may recall .xyz being used by Alphabet.) However lately I'm getting a ridiculous number of .stream SPAM coming through. The RBLs are getting abou

Re: TLD blocking revisited

2016-09-20 Thread li...@lazygranch.com
https://topicdesk.com/downloads/tutorials/spamassassin-filter-for-new-tlds-xyz-info-ninja-etc/ I used this, more or less. It wasn't exactly set up for freebsd. The directory needed is at /usr/local/etc/mail/spamassassin PS: Benny, is that your real email address? I'd like to take this off the list