Am 20.04.2014 21:23, schrieb Dan Thurman:
for some reason, spammers are getting through TLS
and are bypassing/ignoring access database? I poured
over the Internet but have yet to figure it out...
TLS is no protection against a misused of your MTA.
How can I prevent spammers from using my sendmail
server as an open relay even though open-relay is closed?
See below.
Note STARTTLS=client and deferred deliveries when
mail delivery fails and returns errors to my email server?
What is your question? As being a massive source of SPAM your MTA is
already being blacklisted or at least temporarily blocked by other MTAs
like the google mail system.
/var/log/maillog small sample reveals:
[ ... ]
Apr 20 11:42:46 <MYEMAILSERVER> sendmail[3038]: AUTH=server,
relay=90.148.226.111.dynamic.saudi.net.sa [90.148.226.111] (may be
forged), authid=kimt@xxxxxxxxx, mech=PLAIN, bits=0
[ ... ]
Identify the source of the SPAM. In the shown case the sender - is he
one of the spammers? - has authenticated itself as user kimt@xxxxxxxxx.
Watch out where the other SPAM is coming from (not going to). If it is
your AUTH backend, then fix it. It may be enough to change the password
of misused users accounts.
Alexander
--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org