On 2/28/2010 2:26 PM, Carlos Williams wrote:
On Wed, Jan 20, 2010 at 10:34 AM, Ralf Hildebrandt
<ralf.hildebra...@charite.de>  wrote:
/^localhost$/                     550 Don't use my own domain (localhost)!
/^iamghost.\com$/                 550 Don't use my own domain!
/^64\.95\.64\.198$/             550 Your spam was rejected because you're 
forging my IP.
/^\[64\.95\.64\.198\]$/         550 Your spam was rejected because you're 
forging my IP.
/^mail\.iamghost.\com$/           550 Don't use my own hostname!
/^[0-9.-]+$/                        550 Your software is not RFC 2821
compliant: EHLO/HELO must be a domain or an address-literal (IP enclosed in []) 
- not a naked IP.

Beyond this file, does my main.cf file look correct to you?

Looks OK.

Why did this email get through Postfix if my I followed Ralph's
example of helo_checks.pcre'? I posted my postconf -n previously in
this message and above you can see the contents of 'helo_checks.pcre'
&  I would think this would prevent anyone from sending mail to my
Postfix server spoofing my domain in the headers. Am I wrong? I got
the following email this weekend:

Return-Path:<postmas...@iamghost.com>
X-Original-To: postmas...@iamghost.com
Delivered-To: postmas...@iamghost.com
Received: from localhost (localhost.localdomain [127.0.0.1])
    by mail.iamghost.com (Postfix) with ESMTP id EC5B277ADD6
    for<postmas...@iamghost.com>; Sat, 27 Feb 2010 15:05:50 -0500 (EST)
X-Virus-Scanned: amavisd-new at iamghost.com
X-Spam-Flag: YES
X-Spam-Score: 7.457
X-Spam-Level: *******
X-Spam-Status: Yes, score=7.457 tagged_above=-999 required=5
    tests=[BAYES_50=0.001, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457,
    RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033,
    RDNS_NONE=0.1] autolearn=no
Received: from mail.iamghost.com ([127.0.0.1])
    by localhost (iamghost.com [127.0.0.1]) (amavisd-new, port 10024)
    with LMTP id awUEbrkCfcvq for<postmas...@iamghost.com>;
    Sat, 27 Feb 2010 15:05:50 -0500 (EST)
Received: from ambianceimports.com (unknown [89.204.40.160])
    by mail.iamghost.com (Postfix) with SMTP id 179C477ADB5
    for<postmas...@iamghost.com>; Sat, 27 Feb 2010 15:05:48 -0500 (EST)
To:<postmas...@iamghost.com>
Subject: ***SPAM*** Delivery Status Notification
From: Inez<postmas...@iamghost.com>
MIME-Version: 1.0
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:<20100227200549.179c477a...@mail.iamghost.com>
Date: Sat, 27 Feb 2010 15:05:48 -0500 (EST)

I thought this was the point of adding the 'helo_checks' but I think I
am missing something. Can anyone please help explain what I did wrong
or am missing? I think this email should have been prevented with:

/^iamghost\.com$/                   550 Don't use my own domain

The headers of this email show the spammer spoofed this email to come
from 'postmas...@iamghost.com'.

Learn to read the Received: headers.

Received: from helo_hostname (client_hostname [client.ip])
   by myname (Postfix) with SMTP id QUEUEID
   for <recipient>; date

(the "for <recipient>" part is omitted if there is more than one recipient.)

Your check is for the helo_hostname, which is ambianceimports.com.

If you want to prevent your own domain as sender address in outside mail, you'll need to add a check_sender_access map for that.

  -- Noel Jones


*Below is my output of 'postconf -n':

address_verify_sender = $double_bounce_sender
alias_database = hash:/etc/aliases
alias_maps = hash:/etc/aliases, hash:/etc/mailman/aliases
broken_sasl_auth_clients = yes
command_directory = /usr/sbin
config_directory = /etc/postfix
content_filter = amavisfeed:[127.0.0.1]:10024
daemon_directory = /usr/libexec/postfix
home_mailbox = Maildir/
html_directory = no
inet_interfaces = all
mail_owner = postfix
mailq_path = /usr/bin/mailq.postfix
manpage_directory = /usr/share/man
message_size_limit = 20480000
mydestination = $myhostname, $mydomain, mail.$mydomain
mydomain = iamghost.com
myhostname = mail.iamghost.com
mynetworks = $config_directory/mynetworks
myorigin = $mydomain
newaliases_path = /usr/bin/newaliases.postfix
queue_directory = /var/spool/postfix
recipient_delimiter = +
relay_domains =
sendmail_path = /usr/sbin/sendmail.postfix
setgid_group = postdrop
smtp_tls_security_level = may
smtpd_banner = $myhostname ESMTP
smtpd_delay_reject = yes
smtpd_helo_required = yes
smtpd_helo_restrictions = permit_mynetworks,
permit_sasl_authenticated,    reject_non_fqdn_helo_hostname,
reject_invalid_helo_hostname
smtpd_recipient_restrictions = permit_mynetworks,
permit_sasl_authenticated,   reject_unauth_pipelining,
reject_non_fqdn_recipient,   reject_unknown_recipient_domain,
reject_unauth_destination,   reject_unlisted_recipient,
check_policy_service unix:postgrey/socket,   check_sender_access
  hash:/etc/postfix/sender_access,
check_helo_access       pcre:/etc/postfix/helo_checks.pcre,
reject_rbl_client zen.spamhaus.org,   reject_rbl_client bl.spamcop.net
smtpd_sasl_auth_enable = yes
smtpd_sasl_path = private/auth
smtpd_sasl_security_options = noanonymous
smtpd_sasl_type = dovecot
smtpd_sender_restrictions = permit_mynetworks,
permit_sasl_authenticated,    reject_non_fqdn_sender,
reject_unknown_sender_domain,
reject_unknown_reverse_client_hostname,     permit
smtpd_tls_auth_only = yes
smtpd_tls_cert_file = /etc/ssl/mail.crt
smtpd_tls_key_file = /etc/ssl/mail.key
smtpd_tls_loglevel = 1
smtpd_tls_security_level = may
smtpd_tls_session_cache_database = btree:/var/spool/postfix/smtpd_tls_cache
smtpd_tls_session_cache_timeout = 3600s
tls_random_source = dev:/dev/urandom
unknown_local_recipient_reject_code = 550

Reply via email to