as you point out, the problem is spammers can forge what's in the helo message just as they forge what's in MAIL FROM.
but also, unfortunately, a way large percentage of sites do not have correctly configured names in their helos. (some have ip addresses. some have their non-fully-qualified names.) i turned this on just as a warning and recently and discovered that around 15% of correspondents cause warnings. turning it on as an error will probably turn away mail from legit correspondents. (however, i suspect the absence of a legit HELO string could be productively used for grading by SA.) On Thu, Jun 26, 2003 at 04:49:23PM -0500, Bob Apthorpe wrote: > Hi, > > On Thu, 26 Jun 2003, Kai Schaetzl wrote: > > > Tony Earnshaw wrote on Thu, 26 Jun 2003 15:34:17 +0200: > > > > > I, and many other (increasingly many other) mailadmins refuse on invalid > > > HELO/EHLO credentials. Many can not afford to, many see this as a main > > > weapon against non-ham. > > > > Well, what do you exactly do to refuse them? Do a reverse lookup and see if > > it matches? Isn't that quite rigid and will also reject legitimate mail in > > maybe 10% of all instances? > > HELO/EHLO credentials don't have to match an existing host name but they > do have to be formatted properly (i.e. FQDN) I reject on broken HELO > format with Postfix using: > > smtpd_helo_required = yes > > smtpd_helo_restrictions = permit_mynetworks, > hash:$config_directory/moron_bypass, reject_invalid_hostname, > reject_non_fqdn_hostname, reject_unknown_hostname, > hash:$config_directory/ffd_source, permit > > reject_invalid_hostname drops connections with broken hostname syntax > > reject_non_fqdn_hostname rejects connections with HELO not formed as a > FQDN > > reject_unknown_hostname drops connections from machines without DNS A or > MX record (twitchy) > > hash:$config_directory/ffd_source ostensibly does some sanity checks on > mail purporting to come from freemail services (a hack I picked up on > SPAM-L) > > and hash:$config_directory/moron_bypass allegedly whitelists > connections from borked-but-borked servers. I'm not sure if it works. > > I wouldn't recommend some of these options for most installations. I get > FPs, especially because of reject_unknown_hostname, causing me to > temporarily lift that restriction every week or so (I suspect > moron_bypass is not working...) FPs are nowhere near > 10% (much, much less) and this blocks a fair chunk of spam. YMMV. > > hth, > > -- Bob > > > > ------------------------------------------------------- > This SF.Net email is sponsored by: INetU > Attention Web Developers & Consultants: Become An INetU Hosting Partner. > Refer Dedicated Servers. We Manage Them. You Get 10% Monthly Commission! > INetU Dedicated Managed Hosting http://www.inetu.net/partner/index.php > _______________________________________________ > Spamassassin-talk mailing list > [EMAIL PROTECTED] > https://lists.sourceforge.net/lists/listinfo/spamassassin-talk ------------------------------------------------------- This SF.Net email is sponsored by: INetU Attention Web Developers & Consultants: Become An INetU Hosting Partner. Refer Dedicated Servers. We Manage Them. You Get 10% Monthly Commission! INetU Dedicated Managed Hosting http://www.inetu.net/partner/index.php _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk