Hi all,

new MS Azure Cloudapp Spam Wave these days.

Just a few hosts, but a lot of Spam. There is a pattern there, they all use

Return-Path: <MAILER-DAEMON>

to disguise as a bounce and bypass any further checks.

So the PCRE header check

/^Return-Path: <MAILER-DAEMON>/ REJECT Forged Return-Path

does not catch.

Any other chance of making this work in postfix checks?

Actually a re-visit to my topic about MS Azure Cloud Spam from December, but
much more clarified matters now after some time of observation.

Greets,
Ludi





Reply via email to