On Sun, May 04, 2025 at 10:48:52PM -0700, Latincom wrote: > e-mail server 7.7 > How to stop this e-mails to root, please? Thanks.
TL;DR: there is no 100% method, but simple steps like setting up spamd(8) might help. There is no way to actually dictate what people send your way, but there *are* ways to limit what actually lands in your inbox. This particular category of extortion-style spam is annoying but only really worrying if the sending bot is actually in your infrastructure. The received: headers in your included message appear to be pretty local, so you might want to look at the actual server and its logs for clues as to where the message could have come from originally. When it comes to getting rid of annoying mail or at least not having it land in your inbox, it is fairly common practice to set up some kind of filtering on inbound. There are several useful books and articles out there that could help. The most recent and in fact very good book on running your own mail server by Michael Lucas titled "Run Your Own Mail Server" https://www.tiltedwindmillpress.com/product/ryoms/ is worth your money. I have written the odd thing about mail and getting rid of the worst myself. I'd say get Michael's book, take a peek at OpenBSD's in-base spamd(8) https://man.openbsd.org/spamd and related tools, and perhaps look up my stuff such as "Effective Spam and Malware Countermeasures - Network Noise Reduction Using Free Tools" (https://nxdomain.no/~peter/effective_spam_and_malware_countermeasures.html) which has links to various other things such as "In The Name Of Sane Email: Setting Up OpenBSD's spamd(8) With Secondary MXes In Play - A Full Recipe" (https://nxdomain.no/~peter/in_the_name_of_sane_email.html) and various others. Finally, for the category of spam you have quoted, you might find "The Despicable, No Good, Blackmail Campaign Targeting ... Imaginary Friends?" (https://nxdomain.no/~peter/despicable_no_good_blackmail.html) and links therein a bit entertaining, for the greytrapping experience part if nothing else. All the best, Peter -- Peter N. M. Hansteen, member of the first RFC 1149 implementation team https://bsdly.blogspot.com/ https://www.bsdly.net/ https://www.nuug.no/ "Remember to set the evil bit on all malicious network traffic" delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

