>...
>List Mail User a écrit :
>
>>      You're a lot more polite than I am.  I prefer:
>>
>>my_domain.tld         550 You're lying - Trying to use my host
>>.my_domain.tld                550 You're lying - Trying to use my host
>>  
>>
>I don't wanna risk being sued/beaten by some angry guy:)
>
        Its very hard to make any case where using one of my domains
or hosts (or IP addresses) as the HELO/EHLO argument is valid;  It is
probably not possible, but I'm willing to consider that for some site's
configurations it might be.  The number of spam/ratware machines that
attempt this approaches the number with DUL or no rDNS IPs (also a
luxury in which I feel free to indulge my site, but one that clearly
not everybody can use), though most often these groups overlap and
the same machines that attempt to use my own addresses are DUL boxes
and/or have no rDNS.

>>      It is also good to use similar checks for the senders as well
>>as the HELO - i.e.
>>
>>[EMAIL PROTECTED]             550 You are a liar - Sender is not you!
>>[EMAIL PROTECTED]     550 You are a liar - Sender is not you!
>>  
>>
>the issue is that this breaks forwarding, so not everybody wants to do it.
>
        Um, I forward from other locations' mail servers to accounts
at my site all the time - Just the forwarder should use the email
account being forwarded from as the sender or the original sender.
As for the case of a local user sending mail out to a foreign email
account and having it forwarded back, it is just not allowed.  I do
have the luxury of only having a few dozen users (though a couple of
hundred accounts), all of whom I know very well, and on a typical day
less than 12 besides myself receive email (i.e. a quite small site).
But forwarding out and back without sender rewriting is commonly
disallowed - try it on most "freemail" accounts and watch it get
refused.  Also if the original sender has published SPF, you have
to do the "re-write" dance already (since SPF doesn't allow arbitrary
forwarding without rewriting the sender unless you're willing to
count allowing softfail and/or "~all" cases).

        Again, the amount of ratware that forges mainly role accounts
or sets the sender and recipient to the same value is a very large
portion or the email I refuse each day (and the trickier/smarter ones
set the sender to a role account from a different domain than the
recipient's, but still one of mine:( ).

>If you really want that, why not also protect others against that and 
>set SPF records for your domain (and use SPF).
>
        I do for most but not all domains (many are actually "receive-only"
domains, so forwarding is not an issue), and the SPF ends in "-all", not
any wishy-washy "~all".  Unfortunately not everybody (i.e. every site)
which I allow to relay for/to me strictly enforces SPF (they do all either
enforce it, or add headers, so I can and do refuse to accept relayed mail
which has been labeled as failing SPF - "hard" fail, not "soft" fail).
I still end up with cases where an email has been refused either for SPF
or forging a local account's ID for the sender (think of the MAILER-DAEMON
for the silliest case) and then the sending site, which is some usually
poorly run ISP or a company operating an open relay sends a DSN to my
forged account about the refused mail (yes I get often see DSNs sent to
[EMAIL PROTECTED] in my log files, as ludicious as that might
be - of course, they are refused since no outgoing mail is ever labeled
with a sender of MAILER-DAEMON and the MTA sending outbound mail disallows
forwarding of that or most mail originated by many role accounts - i.e.
many role accounts are also "receive-only", basically any not required
by RFCs or published in registration, DNS or other public records).

>>      Of course this is much simpler (fewer special cases) when you use
>>separate machines/MTAs for incoming and outgoing mail or if your network
>>is (relatively) small.
>>  
>>
>or multiple instances on same box. but of course, multiple boxes are 
>better.
>
        Effectively the same for this argument, but separate boxes (even
virtual machines) allow the use of different policies (e.g. my incoming
machines are prevented by firewalls from sending any mail out, or using
nearly any other service either other than relaying to the machine which
does delivery to user accounts).  The same effect could be created by
binding to different IPs and using firewall rules, but binding to only
different ports would not be as effective (read as "strict") for this.
That is why you can see by examining the headers that this message will
have been sent using sendmail, but if you telnet to any on-site 'MX'
for any of my domains, you'll see Postfix running on all incoming servers;
You'll also see a very strict "220" message there - probably enough to
prevent anyone from suing me (successfully) because they are called a
"liar", but IANAL, and people can and will sue over nearly anything.


        Paul Shupak
        [EMAIL PROTECTED]

Reply via email to