I believe you will find lazy domain security rules in KAM.cf that can help with this. ?all, for example, is lazy SPF.
On 8/26/2019 19:20, Benny Pedersen wrote: > i see that bitcoins phinshing is trying to make use of not dkim signed > and use domains without spf, sounds silly and maybe its just not > detected yet anywhre, problem is as example > > From: "nets kundeservice" <i...@nets.eu> > > how to block this if its not dkim signed ? > > same for spf, is it just checking spf none ?, and score that with 100 > so spamas-milter will reject it ? > > what does others do to signal its not accepted, i am begin to be very > tired of phising and spaming abusers > > current 2033 ipv4 addresses listed here localy for trying sasl auth on > port 25 -- Kevin A. McGrail kmcgr...@apache.org Member, Apache Software Foundation Chair Emeritus Apache SpamAssassin Project https://www.linkedin.com/in/kmcgrail - 703.798.0171