On Oct 2, 2014, at 1:57 PM, Reindl Harald <h.rei...@thelounge.net> wrote:
> Am 02.10.2014 um 21:39 schrieb Robert Schetterer: >> not exact what you want , but may help too >> >> http://www.postfix.org/postconf.5.html >> >> check_recipient_ns_access type:table >> Search the specified access(5) database for the DNS servers for the >> RCPT TO domain, and execute the corresponding action. Note: a result of >> "OK" is not allowed for safety reasons. Instead, use DUNNO in order to >> exclude specific hosts from blacklists. This feature is available in >> Postfix 2.1 and later. >> >> smtpd_recipient_restrictions = check_recipient_access >> hash:/etc/postfix/check_recipient_access, >> reject_unknown_recipient_domain, >> reject_non_fqdn_recipient, >> check_recipient_ns_access >> hash:/etc/postfix/for_sale_recipient_ns_access, >> >> /etc/postfix/for_sale_recipient_ns_access >> >> ns2.sedoparking.com REJECT the domain is offered at sedo.com/de to buy, >> which usally means it has no mailserver >> ns1.sedoparking.com REJECT the domain is offered at sedo.com/de to buy, >> which usally means it has no mailserver >> ns1.fastpark.net REJECT the domain is parked at fastpark.net which >> usally means it has no mailserver >> ns2.fastpark.net REJECT the domain is parked at fastpark.net which >> usally means it has no mailserver > > "check_recipient_ns_access" makes little sense for inbound > "check_sender_ns_access" is what you want > This is snowshoe SPAM, however. It’s not the sender who is hosted by Black Lotus, it’s the URL’s contained in the message body.