I am getting a lot of these:

Apr 17 07:27:10 mydomain postfix/smtpd[21897]: connect from 
mone183.secundiarourous.com[141.98.10.183]
Apr 17 07:27:11 mydomain postfix/smtpd[21897]: disconnect from 
mone183.secundiarourous.com[141.98.10.183] ehlo=1 auth=0/1 quit=1 commands=2/3

Googling mone183.secundiarourous.com indicates it is a bad actor for
the most part.

Before I mess with my main.cf, is this a reasonable approach to limit
this server:

https://www.backscatterer.org/?target=usage
Specifically
-------
SAFE MODE with Postfix:

Edit /etc/postfix/main.cf:
smtpd_recipient_restrictions =
...
check_sender_access dbm:/etc/postfix/check_backscatterer
...
Create new file: /etc/postfix/check_backscatterer:
<> reject_rbl_client ips.backscatterer.org
postmaster reject_rbl_client ips.backscatterer.org

Execute following commands:
postmap /etc/postfix/check_backscatterer
postfix reload
for changes to take effect.
-----------------

I would replace dbm with hash. 

Can you have more than one check_senser_access line since I have one
for the RBLs.

Reply via email to