The SMTP protocol RFCs are pretty clear, anything in angle-brackets '<' & '>' take priority in defining an address field. So technically that's a legit local address and sendmail is doing default MSA processing on it (IE treating it as a bare username that needs the local hostname added).

Is this sendmail instance just an incoming MTA or is it also used as an outgoing MSA for your users?

If it's just an incoming MTA (IE your users have another instance they're using for outgoing MSA service) then just turn off the MSA feature for that specific sendmail instance to stop that processing: "FEATURE(` no_default_msa')"


On Wed, 17 Jul 2024, Kirk Ismay wrote:

I have a spammer using a malformed From header, as follows:

From: <UPS>sha...@marketcrank.com

The envelope from is: direcc...@delher.com.mx, and I've set up blocks for that address.

Sendmail is munging the From: header to change <UPS> to <u...@my.host.name>, so it ends up looking like a local address to my users.

How do I detect similar mangled From headers in Spamassassin?

Also does anyone know how to prevent Sendmail from rewriting the From header like this?  The documentation for confFROM_HEADER is a somewhat cryptic:

https://www.sendmail.org/~ca/email/doc8.12/cf/m4/tweaking_config.html#confFROM_HEADER

I'd rather it say <UPS@suspected-spammer> instead, or reject it entirely.

Thanks,
Kirk



--
Dave Funk                               University of Iowa
<dbfunk (at) engineering.uiowa.edu>     College of Engineering
319/335-5751   FAX: 319/384-0549        1256 Seamans Center, 103 S Capitol St.
Sys_admin/Postmaster/cell_admin         Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to