我醒来后发现我的一个客户收到了很多反向散射,并且我的 IP 被列入了两个黑名单!
我能做些什么吗?我已尝试改变我的header_checks
(见下文),但没有任何效果。
最后,我很困惑,为什么他们没有从我的服务器发送这些电子邮件,却把我列入了黑名单!!
我的配置如下(抱歉信息量太大,如果您发现配置有任何其他问题或需要做不同的事情,请告诉我):
主配置文件
smtpd_banner = mail.$myhostname ESMTP mail.$mail_name (Ubuntu)
biff = no
append_dot_mydomain = no
readme_directory = no
smtpd_tls_cert_file=/etc/dovecot/dovecot.pem
smtpd_tls_key_file=/etc/dovecot/private/dovecot.pem
smtpd_use_tls=yes
smtpd_tls_auth_only = yes
smtpd_sasl_type = dovecot
smtpd_sasl_path = private/auth
smtpd_sasl_auth_enable = yes
smtpd_relay_restrictions =
permit_mynetworks
permit_sasl_authenticated
defer_unauth_destination
smtpd_sender_restrictions = reject_unknown_sender_domain
myhostname = mail.foo.info
alias_maps = hash:/etc/aliases
alias_database = hash:/etc/aliases
myorigin = /etc/mailname
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128
mailbox_size_limit = 0
recipient_delimiter = +
inet_interfaces = all
virtual_transport = lmtp:unix:private/dovecot-lmtp
virtual_mailbox_domains = mysql:/etc/postfix/mysql-virtual-mailbox-domains.cf
virtual_mailbox_maps = mysql:/etc/postfix/mysql-virtual-mailbox-maps.cf
virtual_alias_maps = mysql:/etc/postfix/mysql-virtual-alias-maps.cf
milter_protocol = 6
milter_default_action = accept
smtpd_milters = inet:localhost:12301
non_smtpd_milters = inet:localhost:12301
virtual_minimum_uid = 100
virtual_uid_maps = static:5000
virtual_gid_maps = static:5000
message_size_limit = 52428800
header_checks = regexp:/etc/postfix/header_checks
smtpd_client_restrictions = reject_unknown_client_hostname, sleep 3, reject_unauth_pipelining
标头检查:
/^Subject:.*viagra.*/ REJECT
/^Subject:.*pills.*/ REJECT
/^Subject:.*F\*ckbuddy.*/ REJECT
/^Subject:.*F\*ckfriend.*/ REJECT
/^Subject:.*f\@ck.*/ REJECT
/^From:.*viagra.*/ REJECT
#block blackscatter
if /^Received:/
/^Received: +from +(hostname\.co\.uk) +/
reject forged client name in Received: header: $1
/^Received: +from +[^ ]+ +\(([^ ]+ +[he]+lo=|[he]+lo +)(hostname\.co\.uk)\)/
reject forged client name in Received: header: $2
/^Received:.* +by +(hostname\.co\.uk)\b/
reject forged mail server name in Received: header: $1
endif
/^Message-ID:.* <!&!/ DUNNO
/^Message-ID:.*@(hostname\.co\.uk)/
reject forged domain name in Message-ID: header: $1
主配置文件
smtp inet n - - - - smtpd
submission inet n - - - - smtpd
smtps inet n - - - - smtpd
pickup unix n - - 60 1 pickup
cleanup unix n - - - 0 cleanup
qmgr unix n - n 300 1 qmgr
tlsmgr unix - - - 1000? 1 tlsmgr
rewrite unix - - - - - trivial-rewrite
bounce unix - - - - 0 bounce
defer unix - - - - 0 bounce
trace unix - - - - 0 bounce
verify unix - - - - 1 verify
flush unix n - - 1000? 0 flush
proxymap unix - - n - - proxymap
proxywrite unix - - n - 1 proxymap
smtp unix - - - - - smtp
relay unix - - - - - smtp
showq unix n - - - - showq
error unix - - - - - error
retry unix - - - - - error
discard unix - - - - - discard
local unix - n n - - local
virtual unix - n n - - virtual
lmtp unix - - - - - lmtp
anvil unix - - - - 1 anvil
scache unix - - - - 1 scache
maildrop unix - n n - - pipe
flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient}
uucp unix - n n - - pipe
flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
ifmail unix - n n - - pipe
flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
bsmtp unix - n n - - pipe
flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient
scalemail-backend unix - n n - 2 pipe
flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
mailman unix - n n - - pipe
flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py
${nexthop} ${user}
背向散射看起来像这
列入黑名单:
- 截短
- 受保护的天空
请注意foo.info
,所有内容clientdomain.com
均hostname.co.uk
适当链接到我的配置文件