Domain mail spoofing

Hi everyone,

from time to time I receive emails from my own TLD. Those are spoofed emails where someone connects directly to my Yunohost mail server and just spoof the from. I see it is an issue that pops from time-to-time, eg. Spoofing adresse mail
I tried to connect manually to my server from an outside network (tethering from my mobile) and fair enough, it worked like a charm (replacing my TLD with example.com for privacy):

ben@erebor:~$ telnet example.com smtp
Trying xx.xx.xx.xx...
Connected to example.com.
Escape character is '^]'.
220 example.com Service ready
EHLO example.com
250-example.com
250-PIPELINING
250-SIZE 35914708
250-ETRN
250-STARTTLS
250-ENHANCEDSTATUSCODES
250-8BITMIME
250-DSN
250 CHUNKING
MAIL FROM:<admin@example.com>
250 2.1.0 Ok
RCPT TO:<admin@example.com>
250 2.1.5 Ok
DATA
354 End data with <CR><LF>.<CR><LF>
Hello
.

250 2.0.0 Ok: queued as 1A4D4A3AEF
Connection closed.

I checked and my postfix config looks pristine and up-to-date. Am I the only one?

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.