Hi today i got a lot of backscatter / spam amplify to my private email after some funny guy decided to forge my sender and Microsoft Exchange still don't get to check the RCPT before accept mail :-(
is there a easy way to at least block idiots with a from header like below to save time for enter each affected IP to the RBL? meaning: ends with .local, .lan, .localdomain and so on From: Mail Delivery System <MAILER-DAEMON@ces.local> "blacklist_from *@*.local" afaik won't work and "blacklist_from *@ces.local" is unmaintainable _______________________________________________________ that regex list from "check_helo_access" would be fine /.*\.119$/ /.*\.administrator$/ /.*\.admin$/ /.*\.adsl$/ /.*\.arpa$/ /.*\.bac$/ /.*\.beeline$/ /.*\.cici$/ /.*\.coma$/ /.*\.dhcp$/ /.*\.dlink$/ /.*\.dns$/ /.*\.domain$/ /.*\.dynamic$/ /.*\.dyndns\.org$/ /.*\.dyn$/ /.*\.firewall$/ /.*\.gateway$/ /.*\.gt_3g$/ /.*\.gt-3g$/ /.*\.hananet$/ /.*\.home$/ /.*\.internal$/ /.*\.intern$/ /.*\.janak$/ /.*\.kornet$/ /.*\.lab$/ /.*\.lan$/ /.*\.localdomain$/ /.*\.localhost$/ /.*\.local$/ /.*\.loc$/ /.*\.lokal$/ /.*\.mail$/ /.*\.nat$/ /.*\.netzwerk$/ /.*\.pc$/ /.*\.private$/ /.*\.privat$/ /.*\.router$/ /.*\.setup$/ /.*\.skbroadband$/ /.*\.tbroad$/
signature.asc
Description: OpenPGP digital signature