Hub Dohmen wrote:

        Spammers are abusing our system by sending fake bounces to our server,
that Exim'returns' to the'sender'.

        How can ik ignore, of better, delete before accepting.

I do two simple things:

First - DON'T ACCEPT a 'bounce' from a source that lacks proper credentials any more than you would accept any OTHER message from a 'bot:

===

 deny
    condition   = ${if eq{$interface_port}{25}}
    !verify     = reverse_host_lookup
===

Second:

Don't GENERATE  bounces to off-box 'strangers'. At all.
Allow ONLY 'DSN' to your own 'local' user pool, virtual or shell.

-- onpass information IN SESSION (Exim's great strength) and it can ONLY reach the entity connected. Legit or 'bot - it for-sure never goes to a bystander. Such an in-session response will NOT go to the spoofed source - it will be seen only by the entity actually 'on the teat'. If that is a 'real' correspondent, they'll appreciate the immediacy and the saving of a subsequent connection and session. If it is a 'bot? SFW?

-- Send any others to YOURSELF. See 'errors_to', and add it with the mailadmin address (or a log file) to appropriate router/transport sets.
'ALL of 'em for starters...

That annoyance insures you have an incentive to actually FIX whatever faux pas let them arise.

;-)

Bill

--
韓家標

--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to