I should have been more specific in my original request.  The stock rule to 
detect HELO forgery is exactly what I'm looking for.

 -Jim


On Mon, 13 Jun 2005 13:53:40 -0400, Steven Dickenson wrote
> Jim Schueler wrote:
> > My users have been getting particularly insidious emails containing a  
> > windows virus that purports to come from the system administrator.
> 
> [snip]
> 
> > I would expect this test would be part of the distributed SpamAssassin  
> > configuration files.  Can anybody recommend an approach other than   
> > reinventing the wheel?
> 
> I'm fairly certain SA has some stock rules that deal with HELO 
> forgery, but since I'm not totally familier with them, I'll let 
> others speak to that.
> 
> What I can suggest is that you put an AV scanner in your mail path.  
> I'm partial to calling ClamAV from Exim, where I can do SMTP-time 
> rejects of viruses.  Depending on your MTA, you may also be able to 
> do some of these HELO checks during the SMTP session.
> 
> FWIW, I've seen many legitimate sites present incorrect or even 
> invalid HELO data.  Particularly Windows sites behind NAT boxes, or 
> small sites using low-cost broadband where setting up rDNS is impossible.
> 
> - S


--
Open WebMail Project (http://openwebmail.org)

Reply via email to