On 5/26/2010 2:53 PM, brian wrote:
> I've a hunch that the following problem is not something that can be
> configured away through postfix but, as I'm well aware that my config-fu
> is not the strongest, I'd like any advice more experience among you
> might have. I'm sure this isn't a rare problem.
> 
> I recently began supporting the website for a small organisation. One
> change I suggested was to utilise a .org domain rather than .com (not
> due to any trouble but simply because they're a non-comercial
> organisation). The old domain points to this new server in order to
> redirect web traffic. AFAIK, there were never any email addresses used
> under the old domain. But, now I've set up postfix, I'm seeing thousands
> of failed attempts to send to various fictitious DOMAIN.com addresses.
> These are properly being blocked 554/relay access denied.
> 
> I've installed fail2ban, which seems to help. However, I'm still seeing
> several attempts a second as the sender IP is changed. Is there
> something more I can do to mitigate the stress on the server?
> 
> FWIW, aside from aliases for the usual postmaster, abuse, and webmaster
> addresses, this domain has just 2 actual addresses to be maintained. So,
> might a whitelist approach be the way to go? Or, is this something i
> should leave to iptables/fail2ban?
> 
> myhostname = demeter.DOMAIN.org
> mydomain = DOMAIN.org
> myorigin = $mydomain
> alias_maps = hash:/etc/aliases
> alias_database = hash:/etc/aliases
> mydestination = $myhostname, $mydomain, localhost.$mydomain, localhost
> relayhost =
> mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128
> smtpd_recipient_restrictions = permit_mynetworks, reject_unauth_destination


You could look into using RBLs such as spamhaus etc.

-Matt

Reply via email to