Hi

today i got a lot of backscatter / spam amplify to my
private email after some funny guy decided to forge
my sender and Microsoft Exchange still don't get to
check the RCPT before accept mail :-(

is there a easy way to at least block idiots with a from header
like below to save time for enter each affected IP to the RBL?

meaning: ends with .local, .lan, .localdomain and so on
From: Mail Delivery System <MAILER-DAEMON@ces.local>

"blacklist_from *@*.local" afaik won't work and
"blacklist_from *@ces.local" is unmaintainable
_______________________________________________________

that regex list from "check_helo_access" would be fine

/.*\.119$/
/.*\.administrator$/
/.*\.admin$/
/.*\.adsl$/
/.*\.arpa$/
/.*\.bac$/
/.*\.beeline$/
/.*\.cici$/
/.*\.coma$/
/.*\.dhcp$/
/.*\.dlink$/
/.*\.dns$/
/.*\.domain$/
/.*\.dynamic$/
/.*\.dyndns\.org$/
/.*\.dyn$/
/.*\.firewall$/
/.*\.gateway$/
/.*\.gt_3g$/
/.*\.gt-3g$/
/.*\.hananet$/
/.*\.home$/
/.*\.internal$/
/.*\.intern$/
/.*\.janak$/
/.*\.kornet$/
/.*\.lab$/
/.*\.lan$/
/.*\.localdomain$/
/.*\.localhost$/
/.*\.local$/
/.*\.loc$/
/.*\.lokal$/
/.*\.mail$/
/.*\.nat$/
/.*\.netzwerk$/
/.*\.pc$/
/.*\.private$/
/.*\.privat$/
/.*\.router$/
/.*\.setup$/
/.*\.skbroadband$/
/.*\.tbroad$/

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to