Hi Philip,

> Wouldn't it be a lot easier simply to reject those with SPF?  If
> you're seeing mail from one of your domains coming in from a host you
> know couldn't have legitimately sent it, you can reject it outright.

That would block not just the spam, but also legitimate bypassing
through forwarders and email lists (if they don't do VERP).  I would
prefer not to go there for something that could be solved with local
information.
>
> If you don't want to use SPF, you could use a combination of a
> check_client_access to whitelist your hosts followed by a
> check_sender_access.
>
That's a neat work-around.  It hinges on not having any checks or
rejects after these ones, but for the sender_restrictions, that is
currently true.

>> One way to go could be to create a database of sender domains to
>> validate, enter my own domains in it, and use "external" access to my
>> own MTA and probing it.  But that leads to cyclic probing!  I suppose
>> I am really looking for something simpler -- namely an invocation of
>> the virtual(8) server for addresses on the said lists.
>
> Why bother validating the address?

Because that is the vital piece of information that sets the attempts by
spammers aside from proper behaviour.  Because that gives a good source
for detecting, with high degree of certainty, that a party is sending spam.

>
>> I don't see how I can do this with Postfix, and it's not even simple
>> in a policy due to the cyclic risk.  What are others doing in this
>> respect?

Thanks, for your input Phil!

-Rick

Reply via email to