a...@ibcsolutions.de a écrit :
> Excerpts from Charles Gregory's message of Thu Jun 11 07:13:02 -0700 2009:
>> How many accounts are we talking about here?
>> If it is just one or two addresses, and the user(s) being 'spoofed' have
>> distinctive *names* on their genuine 'From' headers, then you can
>> test for quoted messages in the body that contain a From line withthe 
>> correct address but a *wrong* 'name' in front of it.
>>
>> To use your address as an example:
>>
>> body LOC_NOTARVIS /^[ ]*From: "?([^A]|A[^r]|Ar[^v])[^<>@]+<a...@exys\.org>/
>>
>> So any junk 'returned' to you as faked sender, containing, for example:
>>
>>     Returned
>>     From: Bob smith <a...@exys.org>
>>
>> ....would trip over this rule.
>> Also note that if somehow your name is *stripped*, and only the address
>> appears, this rule will *not* trigger. It only works on *wrong* names
>> in front of your address. The use of [^<>@] keeps the rule from triggering 
>> if someone has specified multiple addresses. You might not want this on a 
>> body 'From' test, but I also use this as a header 'To' rule for some of 
>> my clients to stop dictionary spam attacks.... :)
>>
>> - Charles
> 
> Thanks! This looks very useful. 
> 
> We temporarily have blocked some networks which exhaust our relays.
> This is indeed caused by only a few domains all from the same customer
> group (trading stuff), and I think some spammers
> are using those addresses as From:  mainly because 1)  it looks
> trustworthy 2) we allow sender callins.
> Interestingly the backscatter is _only_ caused by domains within Russia
> with almost identical format (well, all qmail ), so I'm looking into
> triggering that.
> 
> That forged Name/Address relationship is a pretty good find. I'll
> look into applying that rule system wide.

I wouldn't recommend this. my friends use many variants of my
name/nick/... that I can't do that even for my own address.

only use as a cure.

Reply via email to