I came across a network that I need to communicate with where (not
unlike the one in
https://bsdly.blogspot.com/2018/02/a-life-lesson-in-mishandling-smtp.html)
they perform the checks for SPF, DKIM and so forth in the wrong places
in addition to on ingress.

Studying the headers at the receiving end it looks like one of the main
problems is that they block DNS over TCP, which leads to the SPF, DKIM
and DMARC queries all time out and their application proceeds on the
assumption that the sending domain does not publish those kinds of
information (despite what host -ttxt bsdly.net on a suitable system will
tell you) and the messages do in fact turn up in the recipient's mailbox.

As one would I have told them that they should look into their firewall
setups and check that they pass 53/udp and 53/tcp both, but I have not
heard back so far.

Back in the day I suppose you could get a sort of working setup with
UDP-only DNS, but this has me wondering, is there a quasi-rational
historical reason for blocking 53/TCP? As in, was there at some point in
time a 'ping of death'-like incident which I have either missed entirely
or forgotten about? If there is, I look forward to some campfire time.

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to