Peter,

> I am planning to implement a policy for my internals users
> where I will set:
>
> $spam_admin_maps => Our ServiceDesk
> $spam_kill_level_maps => [7.0]
> $final_spam_destiny = 'D_BOUNCE'

Ok (just watch the syntax).

> Tried this in a test setup and it works perfectly.
> The reason I want to do this is that in between a user machine
> gets hacked or they answer on a phishing attempt.
> Then someone from outside may use this to spread SPAM.
>
> But what if this insider try to send BIG amounts of SPAM.
> and the systems catch theese attempts, bouncing back and at the
> same time advertising Our service desk - this might break Our system.
>
> Any way to put a threashold to this?

For quick burst of spam the Postfix rate limiting is a big help,
something like:

# resource limits - see anvil(8)
anvil_rate_time_unit = 60
smtpd_client_connection_count_limit = 8
smtpd_client_connection_rate_limit  = 40
smtpd_client_message_rate_limit     = 40
smtpd_client_event_limit_exceptions = 127.0.0.0/8, [::1]

(just make sure to exclude your other mailers and amavisd)

For slow but persistent internal sources of spam
the $spam_admin_maps is a good solution,
hoping that admins are around and read their mail.

  Mark

------------------------------------------------------------------------------
Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA
-OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise
-Strategies to boost innovation and cut costs with open source participation
-Receive a $600 discount off the registration fee with the source code: SFAD
http://p.sf.net/sfu/XcvMzF8H
_______________________________________________
AMaViS-user mailing list
AMaViS-user@lists.sourceforge.net 
https://lists.sourceforge.net/lists/listinfo/amavis-user 
 AMaViS-FAQ:http://www.amavis.org/amavis-faq.php3 
 AMaViS-HowTos:http://www.amavis.org/howto/ 

Reply via email to