Randy a écrit :
> mouss wrote:
>> Ned Slider a écrit :
>>  
>>> Randy wrote:
>>>    
>>>> Ken A wrote:
>>>>      
>>>>> Randy wrote:
>>>>>
>>>>> Are you sure it's not spam bounces (joe job)?
>>>>> This is more common than a spam attack
>>>>> Ken
>>>>>
>>>>>         
>>>> Yeah we get those in spurts, but this appears to not be the case. We
>>>> are getting thousands of connects from non MX hosts and many are
>>>> blocked at the smtp layer by our mail server. The connecting hosts are
>>>> non valid MXes which many do not resolve, are listed in Spamhaus and
>>>> use fake HELO all sending to a single e-mail address.
>>>>
>>>>       
>>> If that's the case then I guess there's not a lot you do about it other
>>> than suck up the volume. About the only thing I can think of is to add a
>>> check_recipient_access entry for that e-mail address to specifically
>>> reject the mail before it gets as far as your RBL checks in postfix. At
>>> least then you could save a bunch of hits against Spamhaus and reject
>>> the mail as early as possible in the smtp process.
>>>
>>>     
>>
>> and even return a 421 so that the connection is closed immediately.
>>   
> 421 or 554?
> I think 554 is the smtp server default code.

with any code except 421, the server will wait for the client to send a
QUIT. With 421, the server drops the connection immediately. This way,
you don't lose resources and you don't accept mail to other recipients
from the guilty transaction.



Reply via email to