Date: Tue, 4 Dec 2001 19:06:53 -0500 (EST) From: doug <doug@safeport.com> To: FreeBSD-questions <freebsd-questions@freebsd.org> Subject: Re: Stopping Spam (was Hi) Message-ID: <Pine.BSF.3.96.1011204181513.12930E-100000@fledge.watson.org> In-Reply-To: <20011204161718.A14154@northernbrewer.com>
next in thread | previous in thread | raw e-mail | index | archive | help
While on this subject; I have a question. More than 3/4's of the UBE I
receive could be stopped if relays refused mail from bogus addresses,
i.e., forward and/or reverse DNS of the submitting mail server does not
work/match
My point is not to start a philosophical discussion on the finer points of
doing this, but rather as a practical manner it is so easy and much more
practical than writing endless regexp's and/or adding 1(0){1,5}s (did I do
that right? :) of IP addresses.
Why not have available as an option to:
1) kill/deny at the HELO
2) run the 'Received: from' chain and kill/deny based on DNS
For me it would be a nice feature in sendmail, but none of the MTAs seem
to have this an option. The only place I could find a reference to such a
thing was http://www.imc.org/ube-sol.html (who lists Sendmail Inc as a
member).
On Tue, 4 Dec 2001, Christopher Farley wrote:
> Rick Hamell (hamellr@heorot.1nova.com) wrote:
>
> >
> > You have a virus..
>
> 90% of the Outlook Script Viruses that get rejected by my mailserver
> come from this list.
>
> Would it be too processor-intensive to do some Postfix body_checks to
> filter out messages containing attachments with various forbidden
> extensions (.exe, .shs, .scr, .js ...)?
>
> --
> Christopher Farley
> www.northernbrewer.com
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-questions" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.1011204181513.12930E-100000>
