Marc skrev den 2023-09-15 23:57:
>Marc skrev den 2023-09-15 17:01:
>>Anyone have any experience with a dns blacklist specific to known smtp
>>auth abuse?

On 15.09.23 17:51, Benny Pedersen wrote:
>spamrats ?
>
>https://www.spamrats.com/

I have bad experiente with spam rats and thus wouldn't recommend using
them.
YMMV of course.


You could be right about this. When I compare the last 413 failed smtp
auths, none are listed in auth.spamrats.com. While bl.spamcop.net
lists 230 at 127.0.0.2, while zen.spamhaus.org gets 371 at
127.0.0.4/127.0.0.3/127.0.0.11. I just have to check which of them is
not a list that lists any 'dynamic' ip by default.

submission inet n       -       y       -       - smtpd
      -o smtpd_tls_security_level=encrypt
      -o smtpd_sasl_auth_enable=yes
      -o smtpd_delay_reject=no
-o { smtpd_client_restrictions = reject_rbl_client auth.spamrats.com=127.0.0.43, permit } -o { smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated, reject }

i find dokumention good, dqs can be added here aswell, but i am unsure if it will expose my dqs key, for me i dont like to use y (chroot), note all details in this, just not auth.spamrats.com plus return code hardend

please be carefull, and ask

Reply via email to