Re: Understanding TrustPath

2011-01-12 Thread mouss
Le 11/01/2011 22:07, Mark Martinec a écrit : >> Consider for a moment how hard it would be for an average spammer to >> spoof rDNS > > This has nothing to do with DNS. The trusted/internal/msa networks > only checks an IP address as it stands in an Received header field, > it does not check nor de

Re: Understanding TrustPath

2011-01-11 Thread Karsten Bräckelmann
On Tue, 2011-01-11 at 22:07 +0100, Mark Martinec wrote: > > Consider for a moment how hard it would be for an average spammer to > > spoof rDNS > > This has nothing to do with DNS. The trusted/internal/msa networks > only checks an IP address as it stands in an Received header field, > it does not

Re: Understanding TrustPath

2011-01-11 Thread Mark Martinec
> Consider for a moment how hard it would be for an average spammer to > spoof rDNS This has nothing to do with DNS. The trusted/internal/msa networks only checks an IP address as it stands in an Received header field, it does not check nor depend on its rDNS or forward DNS. Mark

Re: Understanding TrustPath

2011-01-11 Thread Kris Deugau
Adam Moffett wrote: Right, it's kind of difficult to fake your source IP in a TCP session. But if I read the manual correctly the whitelist_from_rcvd that he's asking about does lookups on hosts in the "Received-from: " headers in the message.which would be trivial to fake. Not really. San

Re: Understanding TrustPath

2011-01-11 Thread Karsten Bräckelmann
On Tue, 2011-01-11 at 15:33 -0500, Adam Moffett wrote: > Right, it's kind of difficult to fake your source IP in a TCP session. > But if I read the manual correctly the whitelist_from_rcvd that he's > asking about does lookups on hosts in the "Received-from: " headers in > the message.which

Re: Understanding TrustPath

2011-01-11 Thread Mauricio Tavares
On 01/11/2011 03:33 PM, Adam Moffett wrote: On 01/11/2011 03:24 PM, Jari Fredriksson wrote: On 11.1.2011 21:24, Mauricio Tavares wrote: Am I correct? What would stop someone from trying to fake the originating IP to fit the ones in the above list? If I am not mistaken, the IP protocol and SMTP

Re: Understanding TrustPath

2011-01-11 Thread Adam Moffett
On 01/11/2011 03:24 PM, Jari Fredriksson wrote: On 11.1.2011 21:24, Mauricio Tavares wrote: Am I correct? What would stop someone from trying to fake the originating IP to fit the ones in the above list? If I am not mistaken, the IP protocol and SMTP. Someone might fake the address when sending

Re: Understanding TrustPath

2011-01-11 Thread Jari Fredriksson
On 11.1.2011 21:24, Mauricio Tavares wrote: > Am I correct? What would stop someone from trying to fake the > originating IP to fit the ones in the above list? If I am not mistaken, the IP protocol and SMTP. Someone might fake the address when sending to you MTA, but your MTA's response would go t

Re: Understanding TrustPath

2011-01-11 Thread Mark Martinec
Mauricio, > I want to use whitelist_from_rcvd, so I am trying to understand > TrustPAth. If you had your MTA outside of your LAN (outside IP LANIP, > internal subnet LANSUB) with its own public IP (say MAILIP), would you have > > internal_networks = MAILIP LANIP LANSUB > trusted_networks = MAILIP

Understanding TrustPath

2011-01-11 Thread Mauricio Tavares
I want to use whitelist_from_rcvd, so I am trying to understand TrustPAth. If you had your MTA outside of your LAN (outside IP LANIP, internal subnet LANSUB) with its own public IP (say MAILIP), would you have internal_networks = MAILIP LANIP LANSUB trusted_networks = MAILIP LANIP LANSUB (+ ot