On Oct 2, 2014, at 1:57 PM, Reindl Harald <h.rei...@thelounge.net> wrote:

> Am 02.10.2014 um 21:39 schrieb Robert Schetterer:
>> not exact what you want , but may help too
>> 
>> http://www.postfix.org/postconf.5.html
>> 
>> check_recipient_ns_access type:table
>>    Search the specified access(5) database for the DNS servers for the
>> RCPT TO domain, and execute the corresponding action. Note: a result of
>> "OK" is not allowed for safety reasons. Instead, use DUNNO in order to
>> exclude specific hosts from blacklists. This feature is available in
>> Postfix 2.1 and later.
>> 
>> smtpd_recipient_restrictions = check_recipient_access
>> hash:/etc/postfix/check_recipient_access,
>>                               reject_unknown_recipient_domain,
>>                               reject_non_fqdn_recipient,
>>                               check_recipient_ns_access
>> hash:/etc/postfix/for_sale_recipient_ns_access,
>> 
>> /etc/postfix/for_sale_recipient_ns_access
>> 
>> ns2.sedoparking.com  REJECT the domain is offered at sedo.com/de to buy,
>> which usally means it has no mailserver
>> ns1.sedoparking.com  REJECT the domain is offered at sedo.com/de to buy,
>> which usally means it has no mailserver
>> ns1.fastpark.net REJECT the domain is parked at fastpark.net which
>> usally means it has no mailserver
>> ns2.fastpark.net REJECT the domain is parked at fastpark.net which
>> usally means it has no mailserver
> 
> "check_recipient_ns_access" makes little sense for inbound
> "check_sender_ns_access" is what you want
> 


This is snowshoe SPAM, however.  It’s not the sender who is hosted by Black 
Lotus, it’s the URL’s contained in the message body.

Reply via email to