On Fri, Jun 26, 2009 at 5:17 PM, mouss<mo...@ml.netoyen.net> wrote:
> so you would block mail from me?

Yes, in fact, the local "cache" mail server would refuse mail from
everyone but the servers mentioned in the external service's SPF
record hence creating sort of an unprotected, IP-based "tunnel"
between the external service and the local server.

The only MX for the serviced domains is that of the external service,
so nobody but the external service's SMTP server should be looking for
the local server's SMTP port; the local server only receives a copy of
the received emails from the external service after spam filtering.

The reason for the local service's existence is to improve the access
speed to the received emails, and to function as an outbound SMTP for
the LAN so that emails with large attachments are sent "immediately"
from the users' point of view (even though large attachments can take
several minutes to send over 2.8Mb internet connection). The local
server's SMTP is open for "mynetworks" (the LAN), and also available
via port 587 with SASL AUTH/TLS so that the users may use it for
outbound mail.

The serviced domains' SPF records include both the external service's
SPF record (via include:) and the IP of the local server (via IP4:).
I'm not totally sold on SPF for it's spam-preventing capability, but
it is handy in automating the check_client_access CIDR map as has been
discussed in this thread. And its use possibly discourages spammers
from using the business domains by making it more likely for the
emails with forged headers to end up trapped by the spam filters.

I've tested this now intially, and it seems to be working well. It's a
bit of a kludge, but gives best of both worlds to the users at a very
low cost: stability and features of a managed external service, and
speed of a local service.

> all that said, if you whitelist IPs or blocks, please submit them to DNSWL.

Thanks for that tip!  I wasn't aware of DNSWL, but will look into it.

Ville

Reply via email to