the server in default ispcp configuration should not been used to recieve mails... there should be added some restrictions.
I post here a sample config how postfix can been secured:
Quote:smtpd_recipient_restrictions = check_client_access hash:/etc/postfix/access_client.hash,
check_helo_access hash:/etc/postfix/access_helo.hash,
check_sender_access hash:/etc/postfix/access_sender.hash,
check_recipient_access hash:/etc/postfix/access_recipient.hash,
check_sender_mx_access cidr:/etc/postfix/access_sender_mx_bogus.cidr,
reject_invalid_hostname,
reject_non_fqdn_sender,
reject_unknown_sender_domain,
reject_non_fqdn_recipient,
reject_unknown_recipient_domain,
permit_mynetworks,
permit_sasl_authenticated,
reject_unauth_destination,
check_recipient_access hash:/etc/postfix/rfc_addresses.hash,
reject_unlisted_recipient,
...policyd-weight...,
...greylisting...
smtpd_data_restrictions = reject_multi_recipient_bounce,
reject_unauth_pipelining
/etc/postfix/access_client.hash:
Black/whitelisting of client hosts/ips
/etc/postfix/access_helo.hash:
Black/whitelisting of client helos
/etc/postfix/access_sender.hash:
Black/whitelisting of sender mail address
/etc/postfix/access_recipient.hash:
Black/whitelisting of recipient mail address
/etc/postfix/access_sender_mx_bogus.cidr
Black/whitelisting of bogus mx servers
/etc/postfix/rfc_addresses.hash
Whitelisting of abuse and postmaster addresses