On Tue, 2010-02-16 at 11:38 -1000, Alexandre Chapellon wrote: > Le mardi 16 février 2010 à 20:29 +0000, Martin Gregorie a écrit : > > On Tue, 2010-02-16 at 08:44 -1000, Alexandre Chapellon wrote: > > > Hello the list, > > > > > > I have a quite buggy customer network, full of zombie PCs that spends > > > all days sending spam and wasting the whole "reputation" of my > > > networks. > > > > > 1) Are you already using separate inbound and outbound mail servers? > > > yes of course > OK, so nothing is stopping you from running separate inbound and outbound SA rule sets. If you include spamc in your SMTP-time processing you can easily reject spam with 5xx responses. Granted a spam-bot will consume any directed at it, but if a FP reject is returned to the user's MUA he should see it.
Look at grey-listing as well. It should be useful if it can distinguish between the user's MUA (or private MTA) and a bot. Better yet, as others have suggested, swap over to using SMTP authentication and TLS. Once you've blocked direct outward SMTP, using authenticated SMTP will also stop the bots in their tracks. > I can't block users from sendin directly.... I am an ISP my users are > free to use another relay than mine... eg google or yahoo or some > mails relay of their own hosted i don't know where. > Why on earth not? You control T&C for your ISP and can change them. If necessary you can keep existing charges for authenticated connections and raise them for those who don't convert. > > - silently discard the spam and tell him you've done so on a daily basis > I don't want to do something like this. > Where's the problem? You'll need to write some code to interpret SA's spam markers anyway, so it can easily add a log message to maillog. Then its trivial to extend logwatch to scan the maillog and generate messages to spamiferous users. Martin