Le 29/12/2010 16:54, Jason Bertoch a écrit :
> 
> I'm starting to see a (new to me) pattern of spam, and only spam, with
> PTR records consisting of a single dot, such as:
> 
> Received: from ejru38.pindmosel.info (. [184.154.78.38] (may be forged))
I used to block these and others in postfix:


pcre = pcre:/etc/postfix/maps/pcre
db  = cdb:/etc/postfix/maps/cdb

smtpd_recipient_restrictions =
        ...
        reject_unauth_destination
        ...
        check_helo_access       ${pcre}/access_host
        check_reverse_client_hostname_access    ${pcre}/access_host

== /etc/postfix/maps/pcre/access_host
/^\.$/          REJECT invalid PTR (single dot)
/^.(arpa|invalid|inv|local|lokaal|private|root|kornet|speedportw700v|firewall|home)$/

                REJECT blah blah
...



> 
> It doesn't appear that there is a stock rule yet to identify this
> particular case.  RDNS_NONE matches, but I believe a more specific rule
> may be in order, or maybe even something at the MTA level if this
> pattern proves reliable.  Has anyone else identified this pattern in
> their mail flow?
> 


header PTR_DOT_ONLY X-Spam-Relays-External =~ /^[^\]]+ rdns=\. /i

we can also try catching bogus TLD's: .arpa, kornet, speedportw700v, ...

header PTR_BOGUS_TLD X-Spam-Relays-External =~ /^[^\]]+
rdns=\S+\.(?:arpa|kornet|speedportw700v|invalid) /i

Reply via email to