On Mon, 9 Mar 2026, Dan Mahoney via Postfix-users wrote:
Return-Path: <[email protected]>

Received: from server-623641.inespre.gob.do (server-623641.inespre.gob.do [50.6.199.138])

Does postfix have a knob to just let me block any server with any fully qualified RDNS of *.gob.do, if this is the kind of thing that they're letting happen? (Versus blocking the sender/recipient, or an IP block?)

you can block via check_client_access type:table by putting into access map:

.gob.do REJECT

see more at http://www.postfix.org/access.5.html

If your parent_domain_matches_subdomains contains "smtpd_access_maps", either use "gob.do" without the leading dot, or remove "smtpd_access_maps" from parent_domain_matches_subdomains - I recommend the latter.

Alternatively you can block the IP or use DNS blocklist that contains the IP (but currently only UCEPROTECT-L2 that should not be used alone)

On Mar 9, 2026, at 1:40 PM, Fred Morris via Postfix-users 
<[email protected]> wrote:
You're mixing categories there, Dan. Return-Path: is the envelope sender; that 
is MAIL FROM, right? Received: is client.

On 10.03.26 22:44, Dan Mahoney via Postfix-users wrote:
I am aware. But the point of including that was to show that this wasn't completely spoofed -- return-path is likely coming from a compromised user-account and thus captured into the data. (The sender doesn't particularly seem to "care" about spoofing the reported hostname, as he isn't setting a From-Header value different to this domain. Nobody said the sender is "smart"). That said, on a compromised machine, spoofing this is trivial.

Telnet tells me this is an Exim box, so this points to compromised and widely-shared UID/auth credentials, picked up in a data breach. Good enough for gobernment work.

That said, this is a Dominican Republic government entity (Instituto Nacional de Estabilización de Precios), and one would think they'd at least grok abuse@ reports, as I've been sending with Spamcop. (I don't guess they'd be reading Mailop).

At this point, there's a fine line here between "state-sponsored attack" and "state-being-clueless-and-taking-no-action-and-enabling attack".

You can use dnsbl within spam checking for scoring.
It's a bit safer than blocking at SMTP level (even if you are spam checking at SMTP level and blocking spam).


--
Matus UHLAR - fantomas, [email protected] ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Fucking windows! Bring Bill Gates! (Southpark the movie)
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to