On Sat, 3 Apr 2010 06:18:25 -0800
Royce Williams <royce.willi...@gmail.com> wrote:

> On Fri, Apr 2, 2010 at 11:20 PM, Henrik K <h...@hege.li> wrote:
> > On Fri, Apr 02, 2010 at 01:45:57PM -0800, Royce Williams wrote:
> >> What is the optimal configuration (local.cf or other) for an ISP's
> >> MSAs to prevent unauthenticated dynamic-IP customers from
> >> triggering dynamic tests, but still benefiting from general
> >> filtering?
> >>
> >> I was hoping for a magical 'mua_networks' option, which let me
> >> enumerate the IP space that my users submit from, and automatically
> >> exempt them from DOS_OE_TO_MX, etc., but I haven't been able to
> >> find anything like that.
> >
> > All dynamic rules look at external relays. So if you have SA on the
> > relay that accepts mail from dynamic space, you need to include all
> > that in internal_networks and disable ALL_TRUSTED since it would
> > always hit.
> 
> Interesting.  I do have SA on my MSAs.  That might be the single knob
> that I am looking for.
> 
> Some folks aren't big enough to have separated MTAs and MSAs; for
> their benefit, is there any other approach that would work?  My
> imagined mua_networks would fit this bill, and it would allow the same
> SA configuration on both MTAs and MSAs, which would make my life as a
> sysadmin easier.

Putting the address ranges into internal_networks is what you do if you
*don't* have separate MSAs and MX servers. Otherwise you you put the
MSAs into msa_networks and internal_networks. Anything that connects to
a server in  msa_networks inherits the internal/trusted status of  the
msa.

Even if you don't or can't do any of the above, SA will pick-up and on
authentication recorded in the received header and for the most part do
the right thing, e.g. it won't run PBL/DUL lookups. 

Reply via email to