We received an influx of mail today addressed to (probably bogus)
users at the domain 'groupprojects.net'.  This domain has the
following MX record:

    groupprojects.net       preference = 0, mail exchanger = 0.0.0.0

When we received the message, qmail connected to 0.0.0.0 to deliver
the mail.  0.0.0.0 connects to 127.0.0.1, so qmail ended up connected
to itself.  It continued to deliver the message to itself, and because
127. is allowed to relay on my system, the message was accepted.  Then
qmail would immediately begin delivering the message to itself again.
Wash, rinse, repeat.

I stopped this from happening by denying connections from 127. in my
TCP rules file for qmail-smtpd (I changed

    127.:allow,RELAYCLIENT="",,RBLSMTPD=""DENYMAIL="DNSCHECK"

to

    127.:deny

), but this seemed like kind of a kludgey solution.

So I have 2 questions.

1) Is there a better way to do this?  Allowing 127. to relay is a
   convenient way for me to test.  I'd like to be able to null-route
   to these addresses in smtproutes instead, but I don't see a way to
   do that.

2) Will anything bad happen as a result of blocking SMTP connections
   from 127.?  I can't think of what this would break, but I've always
   had this address allowed to relay before . . .

Thanks,

------ScottG.

Reply via email to