On Sep 13, 2014, at 7:35 AM, li...@rhsoft.net wrote:

> 
> Am 13.09.2014 um 15:10 schrieb LuKreme:
>> On 12 Sep 2014, at 13:55 , li...@rhsoft.net wrote:
>>> Am 12.09.2014 um 21:49 schrieb Philip Prindeville:
>>>>> However, any time I connect via telnet to this server and specify
>>>>> *any* IP address in the form [X.X.X.X], the smtpd_helo_restrictions
>>>>> won't trigger.
>>>> This is both legal and reasonable.
>>> 
>>> it maybe true but it is *not* reasonable
>> 
>> What do you base that on?
> 
> you stripped that part from my quote
> because it is *easy* to do it right

It’s EASIER to do if you know your topology.  It’s impossible to do with 
absolute certainty if you don’t.


> 
> if someone is not able to determine his public
> hostname and IP he better don't setup a MTA

Again, it’s not just MTA’s which speak SMTP…


> 
> the same way as your internel PTR and A record don't count in
> the internet your internal hostname also is not relevant - set
> the HELO name to the public one matching the public DNS redcords
> and if you don't know where to do so don't setup a public mail server


What if you’re on an ISP (like Comcast residential) which won’t give you a 
fixed address?


> 
>> What problem are you having that you are trying to solve?
> 
> have you ever seen a non-spam connection on a inbound MX with
> such a HELO - yes it happens 1 out of 100000 and only because
> people continue to tell it is reasonable instead block such
> connections
> 
> 

Yeah, all the time.  Each of the company employees when he’s out-of-office and 
connecting remotely.

You’re forgetting that UNTIL you’ve seen the MAIL FROM and RCPT TO, you don’t 
know if this is a CLIENT submitting the message to the OUTBOUND MTA, or another 
MTA attempting FINAL DELIVERY.

So you can’t block on the HELO because that’s way too early.

-Philip


Reply via email to