Will Nordmeyer wrote:
> 
> René Berber wrote:
>> Sherman Lilly wrote:
> [snip]
>>> I get why they are getting through. They are spoofing the Return-Path.
>>> Is there any way to remedy this problem?
>> Depends on your server.  For sendmail there is:
>>
>>      http://ultra.ap.krakow.pl/~raj/sendmail/english.html
>>
>> the FEATURE(`local_sender_check') gets rid of all forged addresses
>> pretending to be from your domain.
>> --
> Unfortunately, at least in my case, the addresses aren't forged - they are
> actual addresses on my server (Some of my clients APPEAR to send themselves
> quite a bit of this garbage), so the local_sender_check wouldn't help,
> because the return path appears to be themselves.

That could be solved with smtp auth, of course that means that your
clients/users need to change their configuration or implementing 
pop-before-send.

As for SA, the plugin Botnet will catch most spammers, over 90% in my experience
(even if it is redundant with some of the dynamic-ip-blacklist tests).
-- 
René Berber

Reply via email to