Will Nordmeyer wrote: > > René Berber wrote: >> Sherman Lilly wrote: > [snip] >>> I get why they are getting through. They are spoofing the Return-Path. >>> Is there any way to remedy this problem? >> Depends on your server. For sendmail there is: >> >> http://ultra.ap.krakow.pl/~raj/sendmail/english.html >> >> the FEATURE(`local_sender_check') gets rid of all forged addresses >> pretending to be from your domain. >> -- > Unfortunately, at least in my case, the addresses aren't forged - they are > actual addresses on my server (Some of my clients APPEAR to send themselves > quite a bit of this garbage), so the local_sender_check wouldn't help, > because the return path appears to be themselves.
That could be solved with smtp auth, of course that means that your clients/users need to change their configuration or implementing pop-before-send. As for SA, the plugin Botnet will catch most spammers, over 90% in my experience (even if it is redundant with some of the dynamic-ip-blacklist tests). -- René Berber