Philip Prindeville wrote:

>> Just whitelist them.. SA sees *both* the From: header AND the Return-Path 
>> header
>> when evaluating "whitelist_from" type commands.
>>  
>>
> 
> The sender was already whitelisted...  Or so I thought.  I'll have to
> double-check that.  She tends to use a lot of different emailboxes.
> 
> Since the From: header is easily forged, isn't this a weakness/liability?

The MAIL FROM is just as easily forged. NEITHER should be trusted.

That's why whitelist_from_rcvd and whitelist_from_spf exist, they add additional
checks to make forgery more difficult.

the _rcvd version takes a second parameter, which must be a partial-match
against the reverse DNS of the hostname in the Received: header dropping mail
off at your network border (as determined by internal_networks).

The _spf version requires the sender's domain publish SPF records, and validates
that the relay used matches the published SPF record.





Reply via email to