I am already using the no_default_msa, but the system does accept mail both as an MTA and MSA.  I am using DAEMON_OPTIONS to listen on port 465 etc, but even adding the M=C (no canonify) switch, the From: header rewriting still occurs.

I've tested with another system using Postfix, and it does the same thing.

Weird.

Thanks,
Kirk

On 2024-07-17 10:55 a.m., Dave Funk wrote:

The SMTP protocol RFCs are pretty clear, anything in angle-brackets '<' & '>' take priority in defining an address field. So technically that's a legit local address and sendmail is doing default MSA processing on it (IE treating it as a bare username that needs the local hostname added).

Is this sendmail instance just an incoming MTA or is it also used as an outgoing MSA for your users?

If it's just an incoming MTA (IE your users have another instance they're using for outgoing MSA service) then just turn off the MSA feature for that specific sendmail instance to stop that processing: "FEATURE(` no_default_msa')"


On Wed, 17 Jul 2024, Kirk Ismay wrote:

I have a spammer using a malformed From header, as follows:

From: <UPS>sha...@marketcrank.com

The envelope from is: direcc...@delher.com.mx, and I've set up blocks for that address.

Sendmail is munging the From: header to change <UPS> to <u...@my.host.name>, so it ends up looking like a local address to my users.

How do I detect similar mangled From headers in Spamassassin?

Also does anyone know how to prevent Sendmail from rewriting the From header like this?  The documentation for confFROM_HEADER is a somewhat cryptic:

https://www.sendmail.org/~ca/email/doc8.12/cf/m4/tweaking_config.html#confFROM_HEADER

I'd rather it say <UPS@suspected-spammer> instead, or reject it entirely.

Thanks,
Kirk



Reply via email to