On Tue, Feb 05, 2019 at 04:48:46PM +0100, Sebastian Nielsen via Exim-users 
wrote:
> in acl_mail (before SPF check):
> 
> accept
>   authenticated = *
>   sender_domains = +local_domains
>   set acl_m0 = authorizedrelay
> deny
>   message = You can't spoof the domains this server is authorative for
>   sender_domains = +local_domains
> 
> 
> then in acl_data:
> deny
>   message = You can't spoof the MIME From this server is authorative for
>   condition = ${if match 
> {$h_from:}{^(?i).*<.*@(.*YOUR_DOMAIN_HERE>\$}{yes}{no}}
>   condition = ${if eq {$acl_m0}{authorizedrelay}{no}{yes}}

 The $h_from: refers to mail header "From:", but you previously wrote
 about MAIL FROM address, which is generally a different thing.

 You have better to run Exim with debugging (-d+acl) and study the output.

> Den tis 5 feb. 2019 kl 15:37 skrev Al T. via Exim-users 
> <[email protected]>...
> > I have manually tested both of these policies and they are working as they
> > should, except in one case: if the MAIL FROM and RCPT TO address are the 
> > same,
> > the mail is accepted without requiring authentication, and without 
> > validating
> > the SPF record. This means some spam gets through by simply claiming to be
> > from me to me.

-- 
 Eugene Berdnikov

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to