Hi, [apologies for turning SA-Talk into a chapter of "Postfix Configuration For Dummies"...]
On Fri, 27 Jun 2003, Ralf Hildebrandt wrote: > * Bob Apthorpe <[EMAIL PROTECTED]>: > > reject_unknown_hostname drops connections from machines without DNS A or > > MX record (twitchy) > > No. This rejects mail from machines that use a non-resolving hostname > as argument to the EHLO/HELO. Rather, no rDNS (PTR)? > > hash:$config_directory/ffd_source ostensibly does some sanity checks on > > mail purporting to come from freemail services (a hack I picked up on > > SPAM-L) > > What's in there? Remember, I didn't write this and I'm only vaguely aware of what it does. A simple explanation would help, else I need to go back to the Postfix book & docs and suss it out for myself, eventually. Anyway, in /etc/postfix/main.cf we find: smtpd_sender_restrictions = permit_mynetworks, hash:/etc/postfix/access, reject_unknown_address, reject_non_fqdn_sender, hash:$config_directory/ffd_source smtpd_restriction_classes = from_ffd_host from_ffd_host = check_client_access hash:$config_directory/ffd_allowed_hosts, reject /etc/postfix/ffd_source contains: # Frequently Forged Domains. # # Only accept mail claiming to be from these domains (based on HELO and/or # SENDER DOMAIN) when the client is within a domain listed in the map # ffd_allowed_hosts. # # Technically, these can be forged amongst themselves, but we do not # expect hotmail servers to claim to be aol.com senders. (hotmail and msn # are interchangable, though.) If the client we are connected to is not # in one of these domains, reject the mail. yahoo.com from_ffd_host aol.com from_ffd_host hotmail.com from_ffd_host msn.com from_ffd_host # __END__ /etc/postfix/ffd_allowed_hosts contains: # See commentary in ffd_source. aol.com OK msn.com OK hotmail.com OK yahoo.com OK # citysearch does evite sending citysearch.com OK # maybe add forwarding services like acm.org or pobox.com to this list. # __END__ > > and hash:$config_directory/moron_bypass allegedly whitelists > > connections from borked-but-borked servers. I'm not sure if it works. > > It should. Note that it only whitelists by the HELO/EHLO argument. > E.g. if a host uses > wrong_syntax.domain.com > as HELO, then whitelisting would be done using > > wrong_syntax.domain.com OK Hrm, things may be broken (still learning how to do access control with hashes, etc.) /etc/postfix/moron_bypass contains: # Temporary bypass for legit but ill-mannered hosts # [EMAIL PROTECTED], please fix your mailer 2note1 OK # Hotmail dimbulbs 65.54.251.13 OK mc5-s4.law1.hotmail.com OK # Los Bastardos # *.client.attbi.net # __END__ The intent is to pass through the following: Jun 13 16:58:23 soyokaze postfix/smtpd[28302]: reject: RCPT from unknown[65.54.251.13]: 450 <mc5-s4.law1.hotmail.com>: Helo command rejected: Host not found; from=<> to=<[EMAIL PROTECTED]> Jun 25 22:10:29 soyokaze postfix/smtpd[14120]: reject: RCPT from cs9356-145.austin.rr.com[24.93.56.145]: 504 <2note1>: Helo command rejected: need fully-qualified hostname; from=<[EMAIL PROTECTED]> to=<[EMAIL PROTECTED]> Ignore the client*.attbi.net stuff; that traffic should be dropped elsewhere (TBD.) This is all from a rusty version of Postfix ('rpm -qa | egrep postfix' -> postfix-20010228pl03-9) hth, -- Bob ------------------------------------------------------- This SF.Net email is sponsored by: INetU Attention Web Developers & Consultants: Become An INetU Hosting Partner. Refer Dedicated Servers. We Manage Them. You Get 10% Monthly Commission! INetU Dedicated Managed Hosting http://www.inetu.net/partner/index.php _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk