Topic: Preventing backscatter failed deliveries for error 553 5.7.1
======== Required information ====
- iRedMail version (check /etc/iredmail-release): 0.9.0
- Linux/BSD distribution name and version: CentOS 6.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Web server (Apache or Nginx): Apache
- Manage mail accounts with iRedAdmin-Pro? no
- Related log if you're reporting an issue:
====
If I spoof an email from an unauthorized mail server (for testing purposes) the legitimate user will get a failed delivery report:
victim@legitdomain.com
x.x.x.x #<x.x.x.x #5.7.1 smtp; 553 5.7.1 <victim@legitdomain.com>: Sender address rejected: not logged in> #SMTP#
I'm trying to prevent these from happening to our users (currently one users gets these backscatter emails on a daily basis). I have tried adding "reject_authenticated_sender_login_mismatch" and "reject_unauthenticated_sender_login_mismatch" to smtpd_recipient_restrictions in /etc/postfix/main.cf but it had no affect.
I have read this: http://www.postfix.org/BACKSCATTER_README.html#real but would like to know if there is a simple configuration that can be changed to stop the failed deliveries from being sent out since that type of error will likely be spoofed spam.
Thanks for any help!
Luke
----
Spider Email Archiver: On-Premises, lightweight email archiving software developed by iRedMail team. Supports Amazon S3 compatible storage and custom branding.