<div dir="ltr">It looks like someone attempted to send through you and your server is trying to tell them it won't deliver it, but it can't because of their malformed sender info. So, no, based on this, I don't think you are spamming. However, your smtp server is perhaps being overly polite in trying to tell the spammer it won't deliver the message. I would suggest hardening off your config a little  more so that it will only accept messages destined for you, and require some form of auth before accepting send requests from clients. That way you won't clog up your system with this sort of shenanigans. While you're in there it would be good to go over the config more generally and make sure you are as optimal as possible. There are lots of resources online that can be turned up with a search for "hardening postfix".<div>

<br></div><div>QH</div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Mon, Sep 1, 2014 at 12:59 PM, Chip Atkinson <span dir="ltr"><<a href="mailto:chip@pupman.com" target="_blank">chip@pupman.com</a>></span> wrote:<br>

<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi folks,<br>
<br>
I'm going through my maillogs and I see entries like this:<br>
<br>
maillog-20140811:Aug  5 00:03:46 tedward postfix/cleanup[23181]: B64A11AE3AB2: message-id=<<a href="mailto:20140805060346.B64A11AE3AB2@tedward.pupman.com" target="_blank">20140805060346.<u></u>B64A11AE3AB2@tedward.pupman.<u></u>com</a>><br>


<br>
maillog-20140811:Aug  5 00:03:46 tedward postfix/qmgr[6868]: B64A11AE3AB2: from=<>, size=10913, nrcpt=1 (queue active)<br>
<br>
maillog-20140811:Aug  5 00:03:46 tedward postfix/bounce[23183]: 84C3A1AE3AA9: sender non-delivery notification: B64A11AE3AB2<br>
<br>
maillog-20140811:Aug  5 00:03:46 tedward postfix/smtp[23187]: B64A11AE3AB2: to=<<a href="mailto:BureauScores@natric.eu" target="_blank">BureauScores@natric.eu</a>>, relay=<a href="http://hgsp68.natric.eu" target="_blank">hgsp68.natric.eu</a>[162.<u></u>253.152.22]:25, delay=0.24, delays=0/0.01/0.23/0, dsn=4.4.2, status=deferred (lost connection with <a href="http://hgsp68.natric.eu" target="_blank">hgsp68.natric.eu</a>[162.253.152.<u></u>22] while receiving the initial server greeting)<br>


<br>
maillog-20140811:Aug  5 00:12:38 tedward postfix/qmgr[6868]: B64A11AE3AB2: from=<>, size=10913, nrcpt=1 (queue active)<br>
<br>
maillog-20140811:Aug  5 00:12:38 tedward postfix/smtp[1505]: B64A11AE3AB2: to=<<a href="mailto:BureauScores@natric.eu" target="_blank">BureauScores@natric.eu</a>>, relay=<a href="http://hgsp68.natric.eu" target="_blank">hgsp68.natric.eu</a>[162.<u></u>253.152.22]:25, delay=532, delays=532/0.01/0.19/0, dsn=4.4.2, status=deferred (lost connection with <a href="http://hgsp68.natric.eu" target="_blank">hgsp68.natric.eu</a>[162.253.152.<u></u>22] while receiving the initial server greeting)<br>


<br>
(Gaps added for clarity due to wrapping)<br>
<br>
To me it looks like my server got some email from "<>" and then tried to deliver to <a href="mailto:BureauScores@natric.edu" target="_blank">BureauScores@natric.edu</a>.<br>
<br>
Is my interpretation correct, and if so, any suggestions on how to combat the problem?<br>
<br>
Here's postconf -n's output if that helps.<br>
<br>
Thanks in advance.<br>
<br>
Chip<br>
<br>
<br>
alias_database = hash:/etc/aliases<br>
alias_maps = hash:/etc/aliases, hash:/usr/local/mailman/data/<u></u>aliases<br>
command_directory = /usr/sbin<br>
config_directory = /etc/postfix<br>
daemon_directory = /usr/libexec/postfix<br>
data_directory = /var/lib/postfix<br>
debug_peer_level = 2<br>
debug_peer_list = <a href="tel:167.88.120.115" value="+16788120115" target="_blank">167.88.120.115</a><br>
html_directory = no<br>
in_flow_delay = 1s<br>
inet_interfaces = all<br>
inet_protocols = ipv4<br>
local_recipient_maps =<br>
mail_owner = postfix<br>
mail_spool_directory = /var/spool/mail<br>
mailq_path = /usr/bin/mailq.postfix<br>
manpage_directory = /usr/share/man<br>
masquerade_domains = <a href="http://pupman.com" target="_blank">pupman.com</a><br>
message_size_limit = 20480000<br>
mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain, mail.$mydomain, www.$mydomain, chip1.$mydomain,  <a href="http://tedward.pupman.com" target="_blank">tedward.pupman.com</a>, <a href="http://www.pupman.com" target="_blank">www.pupman.com</a><br>


mydomain = <a href="http://pupman.com" target="_blank">pupman.com</a><br>
myhostname = <a href="http://tedward.pupman.com" target="_blank">tedward.pupman.com</a><br>
mynetworks = <a href="http://127.0.0.0/8" target="_blank">127.0.0.0/8</a>, <a href="tel:167.88.120.115" value="+16788120115" target="_blank">167.88.120.115</a> [::1]/128<br>
myorigin = $mydomain<br>
newaliases_path = /usr/bin/newaliases.postfix<br>
owner_request_special = no<br>
proxy_interfaces = <a href="tel:167.88.120.115" value="+16788120115" target="_blank">167.88.120.115</a><br>
queue_directory = /var/spool/postfix<br>
readme_directory = /usr/share/doc/postfix-2.6.6/<u></u>README_FILES<br>
recipient_delimiter = +<br>
relay_domains = $mydestination, <a href="http://pupman.com" target="_blank">pupman.com</a>,<br>
sample_directory = /usr/share/doc/postfix-2.6.6/<u></u>samples<br>
sendmail_path = /usr/sbin/sendmail.postfix<br>
setgid_group = postdrop<br>
smtpd_client_restrictions = permit_mynetworks<br>
smtpd_data_restrictions = permit_mynetworks, reject_unauth_pipelining, reject_unauth_destination<br>
smtpd_helo_required = yes<br>
smtpd_helo_restrictions = permit_mynetworks,    reject_non_fqdn_hostname, reject_invalid_hostname,    permit<br>
smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated,           reject_non_fqdn_sender, reject_non_fqdn_recipient,           reject_non_fqdn_hostname, reject_invalid_hostname,           reject_unauth_pipelining, reject_unauth_destination,      check_client_access hash:/etc/postfix/rbl_<u></u>override,           reject_unknown_sender_domain, reject_unknown_recipient_<u></u>domain,           reject_rbl_client <a href="http://zen.spamhaus.org" target="_blank">zen.spamhaus.org</a>,           reject_rbl_client <a href="http://dnsbl.njabl.net" target="_blank">dnsbl.njabl.net</a>, reject_rbl_client <a href="http://bl.spamcop.net" target="_blank">bl.spamcop.net</a>,           reject_rbl_client <a href="http://cbl.abuseat.org" target="_blank">cbl.abuseat.org</a>,           reject_rhsbl_helo <a href="http://dbl.spamhaus.org" target="_blank">dbl.spamhaus.org</a>, reject_rhsbl_sender <a href="http://dbl.spamhaus.org" target="_blank">dbl.spamhaus.org</a>,           permit<br>


smtpd_sender_restrictions = permit_mynetworks, reject_unknown_sender_domain, reject_unknown_address<br>
unknown_local_recipient_<u></u>reject_code = 550<br>
<br>
______________________________<u></u>_________________<br>
Web Page:  <a href="http://lug.boulder.co.us" target="_blank">http://lug.boulder.co.us</a><br>
Mailing List: <a href="http://lists.lug.boulder.co.us/mailman/listinfo/lug" target="_blank">http://lists.lug.boulder.co.<u></u>us/mailman/listinfo/lug</a><br>
Join us on IRC: <a href="http://irc.hackingsociety.org" target="_blank">irc.hackingsociety.org</a> port=6667 channel=#hackingsociety<br>
</blockquote></div><br></div>