Re: AW: Controlling MS Azure Cloud Spam

2020-12-29 Thread Nick Tait
On 30/12/2020 2:38 am, ludic...@gmail.com wrote: @Nick A check for a valid FQDN in From is in smtpd_sender_restrictions. At the point where it got to bounce message, SPF was skipped. Would OpenDMARC then still work? The smtpd_sender_restrictions that you specify are applied to the /envelope

AW: Controlling MS Azure Cloud Spam

2020-12-29 Thread ludicree
permanent field of work, of course. Greets, Ludi Von: owner-postfix-us...@postfix.org Im Auftrag von John Schmerold Gesendet: Montag, 28. Dezember 2020 03:29 An: Nick Tait ; postfix-users@postfix.org Betreff: Re: Controlling MS Azure Cloud Spam On 12/27/2020 3:15 PM, Nick Tait wrote:

Re: Controlling MS Azure Cloud Spam

2020-12-27 Thread John Schmerold
On 12/27/2020 3:15 PM, Nick Tait wrote: Hi Ludi. One option might be to add OpenDMARC to your implementation? The reason for mentioning this is because in addition to checking DMARC policies, OpenDMARC also has an option to reject any message that doesn't have the mandatory headers according

Re: Controlling MS Azure Cloud Spam

2020-12-27 Thread Nick Tait
Hi Ludi. One option might be to add OpenDMARC to your implementation? The reason for mentioning this is because in addition to checking DMARC policies, OpenDMARC also has an option to reject any message that doesn't have the mandatory headers according to RFC 5322: /RequiredHeaders (Boolean)

Controlling MS Azure Cloud Spam

2020-12-25 Thread ludicree
Hi, I am seeing a wave of MS Azure Cloud Spam these days. Many of these mails come with a header: * Return-Path: * Empty From Field They than pass the greylisting filter (and all others it seems) with "Bounce message. Skip." Is there a way to influence this behaviou