If any of you have a problem with blowback (bounces from forged spam and
viruses), this procmail rule should pretty much solve it.

Unfortunately, it has to be customized for your MTA and MUA (on a
per-user basis), but it works really well for me.  The idea is to match
pretty much all bounces and then exclude data from the body that should
be found in legitimate bounces; ones sent locally due to a real
SMTP-time bounce or ones sent after SMTP, but containing data that
likely indicates you sent it (focusing on headers likely to be sent in a
bounce report).

If the envelope sender isn't in Return-path, you'll need to use the
appropriate header.

------- start of cut text --------------
:0
* ^Return-path: \<(\>|mailer.?daemon)
* !^Received:.*REGEXP_THAT_MATCHES_SMTP_TIME_BOUNCE(S)
* !^Message-Id: REGEXP_FOR_YOUR_MESSAGE_ID_FORMAT(S)
* !^From: FROM_AS_SENT_BY_YOUR_MUA(S)
blowback.in
------- end ----------------------------

So, for example, I replace FROM_AS_SENT_BY_YOUR_MUA(S) with:

  Daniel Quinlan <[EMAIL PROTECTED]>

since that's what I use.

-- 
Daniel Quinlan
http://www.pathname.com/~quinlan/

Reply via email to