On Sun, May 04, 2025 at 10:48:52PM -0700, Latincom wrote:
> e-mail server 7.7
> How to stop this e-mails to root, please? Thanks.

TL;DR: there is no 100% method, but simple steps like setting up spamd(8) might 
help.

There is no way to actually dictate what people send your way, but there *are* 
ways to
limit what actually lands in your inbox.

This particular category of extortion-style spam is annoying but only really 
worrying
if the sending bot is actually in your infrastructure.

The received: headers in your included message appear to be pretty local, so 
you might want
to look at the actual server and its logs for clues as to where the message 
could have 
come from originally.

When it comes to getting rid of annoying mail or at least not having it land in 
your inbox,
it is fairly common practice to set up some kind of filtering on inbound.

There are several useful books and articles out there that could help. The most 
recent
and in fact very good book on running your own mail server by Michael Lucas 
titled
"Run Your Own Mail Server" https://www.tiltedwindmillpress.com/product/ryoms/ 
is worth
your money.

I have written the odd thing about mail and getting rid of the worst myself. 
I'd say get
Michael's book, take a peek at OpenBSD's in-base spamd(8) 
https://man.openbsd.org/spamd
and related tools, and perhaps look up my stuff such as

"Effective Spam and Malware Countermeasures - Network Noise Reduction Using 
Free Tools"
(https://nxdomain.no/~peter/effective_spam_and_malware_countermeasures.html) 
which has links
to various other things such as "In The Name Of Sane Email: Setting Up 
OpenBSD's spamd(8) 
With Secondary MXes In Play - A Full Recipe" 
(https://nxdomain.no/~peter/in_the_name_of_sane_email.html)
and various others. Finally, for the category of spam you have quoted, you 
might find 
"The Despicable, No Good, Blackmail Campaign Targeting ... Imaginary Friends?" 
(https://nxdomain.no/~peter/despicable_no_good_blackmail.html) and links therein
a bit entertaining, for the greytrapping experience part if nothing else.

All the best,
Peter


-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://bsdly.blogspot.com/ https://www.bsdly.net/ https://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to