[Old news, but I just came across this, and realise that Ask's question wasn't answered.]

On Thu, 19 May 2005, Ask Bj?rn Hansen wrote:

On May 18, 2005, at 9:20 PM, Keith Ivey wrote:

John Peacock wrote:

> Though a couple of self-inflicted Denial of Service attacks on my mail > servers, I've discovered that qpsmtpd doesn't implement any mailing loop > detection internally. Now that I have fixed my misconfiguration (alias > domains not completely set up), I thought I'd add this to qpsmtpd so it > *can't* happen again. > Any progress on this? I ran into a similar situation a while ago when my server was trying to deliver a message to an address whose MX record resolved to 0.0.0.0.

Why is it that qmail or postfix doesn't detect and stop this (from the Delivered-To headers)?

qmail could/should detect this by recognizing that 0.0.0.0 is a loopback address, and that the recipient domain isn't listed in rcpthosts. But there's a bug. And a patch:

http://www.suspectclass.com/~sgifford/qmail/qmail-0.0.0.0.patch

I don't know what postfix does, but I expect it's sane.

qpsmtpd could/should refuse any message where MX of the sender or recipient domain is 0.0.0.0.

I'd rather not add loop-detection code until we're doing the sending too...

I didn't know there were plans. In any case, there is no need to detect looping - the mail should simply be rejected before the data phase based on the result of the MX lookup.

---
Charlie

Reply via email to