Mailer-Daemon messages

We are unlucky enough to be in some spammers list of spoofing domains. It has been going on for some time now, with no end in sight. I average 150 - 200 Mailer-Daemon messages a day in my mailq. I have been doing some reading online and I found a site that mentioned the following command to help with Mailer-Daemon messages.

check rhsblsender dsn.rfc-ignorant.org

Is anyone using this in their Postfix config? Does it help with the messages I am getting? I currently manually delete the Mailer-Daemon's, I know they go away in a few days, but I would have 1000 before long. I feel helpless since I have no idea what machine is spoofing my domain.

Thanks guys,
JL

Mac OS X (10.4.8)

Posted on Feb 4, 2007 6:40 PM

Reply
10 replies

Feb 4, 2007 7:34 PM in response to Joe Lucia

I recommend understanding Postfix restrictions, and tend to point people to the postfix.org site, and a couple off-site tutorials,
but have a look at this one
http://www.postfix.org/BACKSCATTER_README.html

For an all-in-one document that will greatly improve your Postfix setup, have a look at http://downloads.topicdesk.com/docs/FrontlineSpam_Defense_for_Mail_in_Mac_OSX.pdf

for your situation, in particular, page 4.

For other explanations of postfix restrictions, I tend to suggest
http://www.mengwong.com/misc/postfix-uce-guide.txt
http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt

For rbls, first and foremost you want to use zen.spamhaus.org
http://www.spamhaus.org/zen/

Feb 5, 2007 5:03 AM in response to davidh

Thanks for the info and links.

I implemented the Frontline spam defense a few weeks back and the Mailer-Daemon messages stayed as they are.

I suppose maybe I am missing something in my configs.

I use the zen, which kills lots of junk, but even with all of these, the backscatter continues.

Here is Postconf -n


alias_maps = hash:/etc/aliases,hash:/var/mailman/data/aliases
always_bcc =
command_directory = /usr/sbin
config_directory = /etc/postfix
content_filter = smtp-amavis:[127.0.0.1]:10024
daemon_directory = /usr/libexec/postfix
debug peerlevel = 2
disable vrfycommand = yes
enable serveroptions = yes
inet_interfaces = all
local recipientmaps = proxy:unix:passwd.byname $alias_maps
luser_relay =
mail_owner = postfix
mailbox_transport = cyrus
mailq_path = /usr/bin/mailq
manpage_directory = /usr/share/man
message sizelimit = 5242880
mydestination = $myhostname,localhost.$mydomain,mail.cysd.k12.pa.us,cysd.k12.pa. us
mydomain = cysd.k12.pa.us
mydomain_fallback = localhost
myhostname = mail.cysd.k12.pa.us
mynetworks = 127.0.0.1/32,10.18.0.0/21,10.19.0.0/16,10.20.0.0/16,10.21.0.0/16,10 .18.8.0/21,10.18.16.0/21,10.22.0.0/16
mynetworks_style = host
myorigin = $myhostname
newaliases_path = /usr/bin/newaliases
owner requestspecial = no
queue_directory = /private/var/spool/postfix
readme_directory = /usr/share/doc/postfix
recipient_delimiter = +
relayhost =
sample_directory = /usr/share/doc/postfix/examples
sendmail_path = /usr/sbin/sendmail
setgid_group = postdrop
smtpd clientrestrictions = permit sasl_authenticated,permitmynetworks hash:/et c/postfix/smtpdreject reject rblclient zen.spamhaus.org permit
smtpd datarestrictions = permit mynetworks,reject_unauthpipelining,permit
smtpd enforcetls = no
smtpd helorequired = yes
smtpd helorestrictions = permit sasl_authenticated,permit_mynetworks,rejectnon fqdn_hostname,reject_invalidhostname,permit
smtpd pw_server_securityoptions = plain,login,cram-md5,gssapi
smtpd recipientrestrictions = reject invalid_hostname,reject_non_fqdnsender,re ject non_fqdn_recipient,permit_sasl_authenticated,permit_mynetworks,rejectunaut h destination,reject_unlisted_recipient,reject_rblclient zen.spamhaus.org,permi t
smtpd sasl_authenable = yes
smtpd senderrestrictions = permit sasl_authenticated,permit_mynetworks,rejectn on fqdnsender,permit
smtpd tlsCAfile = /etc/certificates/mail.cysd.k12.pa.us.chcrt
smtpd tls_certfile = /etc/certificates/mail.cysd.k12.pa.us.crt
smtpd tls_keyfile = /etc/certificates/mail.cysd.k12.pa.us.key
smtpd tlsloglevel = 0
smtpd use_pwserver = yes
smtpd usetls = yes
unknown local_recipient_rejectcode = 550


And a sample of Daemons.

D6397D57AA7 3110 Mon Feb 5 07:56:31 MAILER-DAEMON
(connect to mx2.planeteria.net[206.15.80.80]: Operation timed out)
contacttiqg@terrazassanmiguel.com

D80E5D50DFD 3669 Mon Feb 5 06:00:45 MAILER-DAEMON
(lost connection with ZAAGS.COM[74.202.197.27] while sending end of data -- message may be sent more than once)
bounce@ZAAGS.COM

D9BB0D5142A 3286 Mon Feb 5 06:14:51 MAILER-DAEMON
(Host or domain name not found. Name service error for name=kaiserep.com type=MX: Host not found, try again)
estridgeukwa@kaiserep.com

DCEE4D4FB95 3733 Mon Feb 5 05:07:11 MAILER-DAEMON
(connect to exalumnos.com[200.52.138.235]: Operation timed out)
Burns@exalumnos.com

E0FF1D4C8CD 10123 Mon Feb 5 02:21:41 MAILER-DAEMON
(connect to MAIL.i-gate.net.ph[210.14.0.113]: Connection refused)
hbmifhkvl@pldt.net

E744CD51180 3799 Mon Feb 5 06:09:28 MAILER-DAEMON
(conversation with water.thekwolesgroup.com[216.91.137.239] timed out while sending end of data -- message may be sent more than once)
TicketConfirmation@thekwolesgroup.com

EB769D4D6E7 1005 Mon Feb 5 03:17:37 ""@bestshortcuts.com
(host 127.0.0.1[127.0.0.1] said: 451 4.5.0 Error in processing, id=03596-08, spam quar+notif FAILED: Can not quarantine: 501 5.5.0 Rejected by MTA: 501 Bad address syntax, id=03596-08 at /usr/bin/amavisd line 7133. (in reply to end of DATA command))
khudson@cysd.k12.pa.us

EC3F0D4CA81 5901 Mon Feb 5 02:24:44 MAILER-DAEMON
(connect to wbtepw.stingplayerhot.com[64.209.219.79]: Operation timed out)
3-2927212-cysd.k12.pa.us?lestep@wbtepw.stingplayerhot.com

F077CD4B258 15168 Mon Feb 5 00:25:32 MAILER-DAEMON
(connect to mail.hosi.com[80.123.149.26]: Operation timed out)
urrocky@hosi.com


Thanks!
JL

Mac OS X (10.4.8)

Feb 5, 2007 5:15 AM in response to Joe Lucia

We are unlucky enough to be in some spammers list of
spoofing domains. It has been going on for some time
now, with no end in sight. I average 150 - 200
Mailer-Daemon messages a day in my mailq. I have been
doing some reading online and I found a site that
mentioned the following command to help with
Mailer-Daemon messages.

check rhsblsender dsn.rfc-ignorant.org


I think "check rhsblsender" is now defunct.

Is anyone using this in their Postfix config? Does it
help with the messages I am getting? I currently
manually delete the Mailer-Daemon's, I know they go
away in a few days, but I would have 1000 before
long. I feel helpless since I have no idea what
machine is spoofing my domain.


It may look frightening but your server should be well capable of handling it. It is actually quite clever... After the first attempt fails, it tries to make another only after the minimal backofftime (default: 1000s). Each time it fails, it doubles the time it waits before trying again until it reaches the maximal backofftime (default: 4000s). Both these defaults can be changed in main.cf. It is also very careful to not let this defered queue overwhelm its normal operations with newly incoming mail. See...
http://developer.apple.com/documentation/Darwin/Reference/ManPages/man8/qmgr.8.h tml

If you really want to clear the deferred queue, you can use sudo postsuper -d ALL deferred
See... http://developer.apple.com/documentation/Darwin/Reference/ManPages/man1/postsupe r.1.html

You could alternatively reduce the queue lifetime (even temporarily) until the backscatter reduces, using the bounce queuelifetime option. The default for this is 5 days before it gives up and drops the message. E.g., in main.cf add bouncequeuelifetime = 1d

-david

Server 10.4.8

Feb 5, 2007 5:26 AM in response to David_x

Sometimes I have teachers that say they sent emails that took a hour to reach the destination. I rush in and clear the Mailer-Daemons, I am thinking they are not related. It is only on a rare occasion that happens, but I clean them everyday.

I just didn't want the mailq to hold legit mail while trying to process junk. It seems postfix is smarter than that thank goodness.

I am guessing my postconf file looks right?

Thanks,

JL

Feb 5, 2007 7:07 AM in response to Joe Lucia

Backscatter to existing users will obviously not be blocked. Not even when you apply my tutorial.

What happens is that a spammer will send out spam with one of your users as the forged sender. On the receiving end, if this gets rejected, it will return to your server. This is something we all have to live with.

It is possible to block a good amount of backscatter to known users as well, but it usually is not worth the effort. If you feel you need/want to do this, have a look at the link David posted earlier: http://www.postfix.org/BACKSCATTER_README.html

Alex

Feb 6, 2007 6:34 PM in response to Joe Lucia

Joe,

Buy a product?!? 😉

I wouldn't hesitate to bludgeon them if I ever catch them!! It is such a counterproductive, and evil enterprise that these people are engaged in.

Putting my server in their spoofed headers is nothing but malicious!! They could have put ANYTHING in there! Why my legitimate server.

I have such hatred for these people - they cost me time and money fixing their little get rich schemes.

Why work hard like the rest of us??

I would love to put the government of Singapore in charging of regulating internet spam... now THAT would bring some quick solutions..

Caning anyone... oh and they're closer to China/India... for some quick snatch & grab raids 😉

Surely I jest... yes.. but just barely! =)

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Mailer-Daemon messages

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.