Magnus Bäck a écrit :
> On Thursday, December 11, 2008 at 19:25 CET,
> mouss wrote:
>
>> smtpd_sender_restrictions =
>> check_sender_access hash:/etc/postfix/mysenders
>> reject_unauth_destination
>> ...
>>
>>
>> == mysenders:
>> example.com OK
>>
>> Note that this works for
mouss wrote:
> Gerardo Herzig a écrit :
>> Victor Duchovni wrote:
>>> On Thu, Dec 11, 2008 at 02:32:52PM -0300, Gerardo Herzig wrote:
>>>
Hi all. Im facing a ugly situation. Some spammer is using the webmail to
send spam. The thing is, hes using an actual account/password (from my
s
On Thursday, December 11, 2008 at 19:25 CET,
mouss wrote:
> smtpd_sender_restrictions =
> check_sender_access hash:/etc/postfix/mysenders
> reject_unauth_destination
> ...
>
>
> == mysenders:
> example.com OK
>
> Note that this works for the envelope sender, not the Fr
Terry Carmen wrote:
>
> Hi all. Im facing a ugly situation. Some spammer is using the
> webmail to
> send spam. The thing is, hes using an actual account/password
> (from my
> server)to authenticate agains the webmail, and then sending mail from
> "UK LOTTO "...crap!
>
Hi all. Im facing a ugly situation. Some spammer is using the webmail to
send spam. The thing is, hes using an actual account/password (from my
server)to authenticate agains the webmail, and then sending mail from
"UK LOTTO "...crap!
I'd also recommend switching to a webmail package th
Brian Evans - Postfix List a écrit :
>
> Really the only thing that can be done on the postfix side is to
> implement smtpd_sender_login_maps and
> reject_authenticated_sender_login_mismatch (or similar).
> This is a matter of policy as any matches with invalid results will be
> rejected.
>
> See
Gerardo Herzig a écrit :
> Victor Duchovni wrote:
>> On Thu, Dec 11, 2008 at 02:32:52PM -0300, Gerardo Herzig wrote:
>>
>>> Hi all. Im facing a ugly situation. Some spammer is using the webmail to
>>> send spam. The thing is, hes using an actual account/password (from my
>>> server)to authenticate
Gerardo Herzig wrote:
> Victor Duchovni wrote:
>
>> On Thu, Dec 11, 2008 at 02:32:52PM -0300, Gerardo Herzig wrote:
>>
>>
>>> Hi all. Im facing a ugly situation. Some spammer is using the webmail to
>>> send spam. The thing is, hes using an actual account/password (from my
>>> server)to au
Gerardo Herzig wrote, at 12/11/2008 12:47 PM:
> Victor Duchovni wrote:
>> Change the password for the compromised account. Or do you offer free
>> sign-up?
>
> Well, yes, that an option. But seems like a partial solution. About the
> postfix configuration: There is anything i can do to avoid an ac
Victor Duchovni wrote:
> On Thu, Dec 11, 2008 at 02:32:52PM -0300, Gerardo Herzig wrote:
>
>> Hi all. Im facing a ugly situation. Some spammer is using the webmail to
>> send spam. The thing is, hes using an actual account/password (from my
>> server)to authenticate agains the webmail, and then s
Gerardo Herzig wrote, at 12/11/2008 12:32 PM:
> Hi all. Im facing a ugly situation. Some spammer is using the webmail to
> send spam. The thing is, hes using an actual account/password (from my
> server)to authenticate agains the webmail, and then sending mail from
> "UK LOTTO "...crap!!
>
> Sinc
On Thu, Dec 11, 2008 at 02:32:52PM -0300, Gerardo Herzig wrote:
> Hi all. Im facing a ugly situation. Some spammer is using the webmail to
> send spam. The thing is, hes using an actual account/password (from my
> server)to authenticate agains the webmail, and then sending mail from
> "UK LOTTO <
Hi all. Im facing a ugly situation. Some spammer is using the webmail to
send spam. The thing is, hes using an actual account/password (from my
server)to authenticate agains the webmail, and then sending mail from
"UK LOTTO <[EMAIL PROTECTED]>"...crap!!
Since i have
smtpd_recipient_restrictions =
13 matches
Mail list logo