Am 14.09.2014 um 01:54 schrieb Philip Prindeville: > On Sep 13, 2014, at 7:35 AM, li...@rhsoft.net wrote: >> Am 13.09.2014 um 15:10 schrieb LuKreme: >>> On 12 Sep 2014, at 13:55 , li...@rhsoft.net wrote: >>>> Am 12.09.2014 um 21:49 schrieb Philip Prindeville: >>>>>> However, any time I connect via telnet to this server and specify >>>>>> *any* IP address in the form [X.X.X.X], the smtpd_helo_restrictions >>>>>> won't trigger. >>>>> This is both legal and reasonable. >>>> >>>> it maybe true but it is *not* reasonable >>> >>> What do you base that on?
> Who says anything about mail servers? the topic by definition > What if it’s an MUA doing this? a MUA is using authentication and that is why you have *permit_sasl_authenticated* before such restrictions see the last paragraph of my post which refers to default settings and behavior of postfix, so the next time please hestitate to step into a topic saying something is completly reasonable by lack understand the topic >> you stripped that part from my quote >> because it is *easy* to do it right > > It’s EASIER to do if you know your topology. It’s impossible to do > with absolute certainty if you don’t if you don't know your topology don't setup a MTA >> if someone is not able to determine his public >> hostname and IP he better don't setup a MTA > > Again, it’s not just MTA’s which speak SMTP… again - only MTA's have to deliver unauthenticated mail >> the same way as your internel PTR and A record don't count in >> the internet your internal hostname also is not relevant - set >> the HELO name to the public one matching the public DNS redcords >> and if you don't know where to do so don't setup a public mail server > > What if you’re on an ISP (like Comcast residential) which won’t give you a > fixed address? than you don't have to run a MTA, hence that rules if you runa MTA there then you have to use a smarthost for delivery if you are a legit MUA you have to use SMTP auth and so the rule sdon't affect you >>> What problem are you having that you are trying to solve? >> >> have you ever seen a non-spam connection on a inbound MX with >> such a HELO - yes it happens 1 out of 100000 and only because >> people continue to tell it is reasonable instead block such >> connections > > Yeah, all the time. Each of the company employees when > he’s out-of-office and connecting remotely. that is pure bullshit in that case they are using SMTP authentication and so they are not affected by MTA rules or otherwise fire your mailadmin please come back after read some prerequisite for a topic like this > You’re forgetting that UNTIL you’ve seen the MAIL FROM and RCPT TO, > you don’t know if this is a CLIENT submitting the message to the > OUTBOUND MTA, or another MTA attempting FINAL DELIVERY. bullshit - the MUA is using authentication > So you can’t block on the HELO because that’s way too early bullshit - http://www.postfix.org/postconf.5.html#smtpd_delay_reject smtpd_delay_reject (default: yes) Wait until the RCPT TO command before evaluating $smtpd_client_restrictions, $smtpd_helo_restrictions and $smtpd_sender_restrictions, or wait until the ETRN command before evaluating $smtpd_client_restrictions and $smtpd_helo_restrictions smtpd_helo_restrictions = check_helo_access proxy:regexp:/etc/postfix/blacklist_helo.cf check_sender_access proxy:hash:/etc/postfix/whitelist_sender.cf reject_non_fqdn_helo_hostname reject_invalid_helo_hostname