> > Nobody has any experience/advice about this matter ??
>
> > ..... Waiting for the experts :-)
>
> No experts here but here's what I'd suggest to limit false positives and
let
> Declude do the rest:
>
> reject_unauth_pipelining
> reject_unknown_recipient_domain

No need to do reject_unknown_recipient_domain twice.  Get rid of the first
instance.

> reject_unauth_destination
> reject_non_fqdn_recipient
> reject_non_fqdn_sender
> reject_unknown_sender_domain
> reject_unknown_recipient_domain
> reject_invalid_hostname
>
> And the check for commonly forged domains w/rDNS that doesn't match (not
> sure what Len is calling that in the current config).  Also, maybe the
check
> for hosts greeting you with your own domain name or server's IP in the
HELO.

This is a good minimalist config that will clean out a good deal of
things.

You could add a few other things based off your present Deculde setup.  If
you trust certain RBLs, or always reject certain extensions, move this
from Imail/Declude to Postfix.

Because I work at an ISP, I need to have checks that will not irritate our
customers with false positives.  I use the following:

smtpd_recipient_restrictions =
        reject_unauth_pipelining,
        reject_non_fqdn_recipient,
        reject_non_fqdn_sender,
        permit_mynetworks,
        reject_unauth_destination,
        check_recipient_access hash:/etc/postfix/bad_recipient.map,
        check_sender_access hash:/etc/postfix/good_sender.map,
        check_recipient_access hash:/etc/postfix/good_recipient.map,
        check_client_access hash:/etc/postfix/bad_domain.map,
        check_sender_access hash:/etc/postfix/bad_domain.map,
        check_sender_access btree:/etc/postfix/spamlist-extended.btree,
        check_client_access hash:/etc/postfix/forged_check.map,
        check_helo_access hash:/etc/postfix/helo_hostname_forged.map,
        check_client_access pcre:/etc/postfix/bad_client.pcre,
        reject_unknown_sender_domain,
        reject_unknown_recipient_domain,
        reject_rbl_client blackholes.easynet.nl,
        reject_rbl_client relays.ordb.org,
        reject_rbl_client proxies.relays.monkeys.com,
        reject_rbl_client socks.relays.osirusoft.com,
        reject_rbl_client spamhaus.relays.osirusoft.com,
        reject_rhsbl_sender dsn.rfc-ignorant.org,
        permit

Now for a short description of my maps.

/etc/postfix/bad_recipient.map
    Known bad addresses that get a lot of mail still.  I plan on switching
to the recipient verification sometime, but for now this works.

/etc/postfix/good_sender.map
    My whitelist to exempt senders.

/etc/postfix/good_recipient.map
    My whitelist to exempt postmaster@, and people that do not want
blocking.

/etc/postfix/bad_domain.map
    A list of domain names that I do not like.

/etc/postfix/spamlist-extended.btree
    The Wirehub/Easynet SLET list.  Note: I mapped as a BTree for
performance reasons.  It has a benefit in larger files under FreeBSD.

/etc/postfix/forged_check.map
    A number of more commonly forged clients.

/etc/postfix/helo_hostname_forged.map
    Test a small number of domains for forged HELO information.

/etc/postfix/bad_client.pcre
    A PCRE regular expression to strip off direct connections from some
DSL services.  I did not find the RBLs for dynamic addresses to be very
effective.  This lets me block the few that I do see regular abuse from.

--Eric


Reply via email to