Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 29 May 2003 07:37:49 -0400 (EDT)
From:      Stephen Hovey <shovey@buffnet.net>
To:        Kirk Strauser <kirk@strauser.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Spammers forged my address - help unbury me from bounces?
Message-ID:  <Pine.BSF.4.05.10305290737260.1542-100000@buffnet11.buffnet.net>
In-Reply-To: <87el2ixt2v.fsf@pooh.honeypot.net>

next in thread | previous in thread | raw e-mail | index | archive | help

Ive had this happen to me and couldnt figure out any good solution.

Its one of those reasons why they should have the death penalty for
spammers.

On Wed, 28 May 2003, Kirk Strauser wrote:

> Some jackass(es) sent a bunch of spam with forged From: headers referring to
> non-existent accounts on one of my domains.  Consequently, I've been getting
> about 20,000 bounce messages per day to Erin@honeypot.net,
> Michelle@honeypot.net, etc.  What's a good way to handle these?  If I set up
> aliases to /dev/null, then I still have to receive an entire bounce message
> before silently discarding it (and even worse, have to watch the
> SpamAssassin milter process it before discarding it).  If I don't set up any
> aliases for those users, then I get bounce messages from my own mailserver
> telling me that it couldn't deliver the original bounce messages to the fake
> usernames.
> 
> Help!
> 
> What I really want is something like:
> 
> if ($user == 'Erin' or $user == 'Michelle')
> {
>    send 550 to remote server
>    do nothing else at all
> }
> 
> Is this possible?  Please save me from being pushed over the line, buying a
> paintball gun, and going hunting.
> -- 
> Kirk Strauser
> 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.10305290737260.1542-100000>