Elijah Savage:
> I am seeing thousands of spam messages beginning on Thursday of last week
> from the same subnet. I know it is not best practice to fight spam by
> outright blocking ip addresses but I am seeing this across multiple domains
> in different parts of the country. The easy and immediate thought was just
> block the subnet but I do not like utilizing that practice. I think I know
> the answer but will ask anyway, do you all think there is a high probability
> to get false positives from those with incorrect DNS setups in using 

Sometimes I can block multiple spam campaigns with a single
check_sender_ns_access or check_sender_mx_access rule.

These work against spammers who change sender address domains and
client IP addresses, but who reuse DNS or other infrastructure.

Running this shell command may reveal common elements:

    while read domain
    do
        for type in ns mx a; do dig +noall +answer -t $type $domain; done
    done < file-with-domain-names

As input, use a list of sender domain names or helo domain names
(including parent domains).

        Wietse

Reply via email to