⇤ ← Revision 1 as of 2010-02-04 07:22:27
869
Comment:
|
869
interwiki link change
|
Deletions are marked like this. | Additions are marked like this. |
Line 5: | Line 5: |
Some spammers set their PTR records to return `localhost`, which can bypass some anti-spam measures. You can use Postconf:check_reverse_client_hostname_access and Postconf:check_helo_access to deal with these. | Some spammers set their PTR records to return `localhost`, which can bypass some anti-spam measures. You can use PostConf:check_reverse_client_hostname_access and PostConf:check_helo_access to deal with these. |
Postfix/Spammers_with_localhost_ptr_dns_records
From http://archives.neohapsis.com/archives/postfix/2009-08/0350.html
Some spammers set their PTR records to return localhost, which can bypass some anti-spam measures. You can use PostConf:check_reverse_client_hostname_access and PostConf:check_helo_access to deal with these.
I use somthing like this:
smtpd_recipient_restrictions = ... check_reverse_client_hostname_access ${hash}/access_host check_helo_access ${hash}/access_host ...
to reject things like:
localhost unreachable .localhost .arpa .invalid .inv .test .local .lokaal .localdomain .lan .private .root .adsl .firewall .speedportw700v .belkin .kornet ...
be them found in helo or in the PTR. I also use a pcre version to reject "." as PTR (among other things).