On 6/19/2017 1:54 PM, Robert Kudyba wrote:
> We use sendmail-8.15.2-8.fc25 on Fedora 25
> with spamassassin-3.4.1-9. Can anyone explain how this email got
> through with a forged from: address? https://pastebin.com/L7NKCK3E
>
> The 1st received IP is not on any real time blacklist as of this
> moment:
>
> Received: from 167.249.16.132
>
> The 2nd IP in the mail header trail now shows up
> in BACKSCATTER, BLOCKLIST.DE and MAILSPIKE BL
>
> Received: from embacelsga.localdomain (oi66.grupocartonpack.com
> <http://oi66.grupocartonpack.com> [189.30.23.66])
>
> But shouldn’t the default settings in sendmail.mc/cf check for
> spoofing of the HELO?


It appears this mail passed through your system and was forwarded to
google, and maybe a little mangled along the way.  This makes the
headers hard to follow as to who added what, and what to trust.

I don't believe sendmail has any default setting for rejecting HELO
names.  You should probably add "localdomain" to your access table.




Reply via email to