Jim McCullars and I have been discussing filter_helo offlist, and David's observation (supported by Jim's experimentation) that if filter_helo returns a REJECT, the connection is not immediately rejected, but rather is rejected after MAIL FROM.

It happens that I have been using a heavily-logged filter, and examined some test connections that Jim made to my mailserver. Some interesting results came out of that. I'm using sendmail v8.13.8 and MIMEDefang v2.57 on Solaris 9 with Perl v5.8.6.

It is true that even if filter_helo returns REJECT, the connection is not immediately dropped. The sending host can still issue another command, such as MAIL FROM.

However, it is also true that if the sending host does issue another command, like MAIL FROM, that there is no corresponding MILTER call. MIMEDefang never sees a call to filter_sender if filter_helo returns a REJECT.

So it *appears* like the connection is maintained, but it also seems that the SMTP conversation *effectively ends* if filter_helo returns REJECT. The connecting host can issue another command, but it will be ignored.

I've theorized that if the connecting host issues a RSET followed by another (valid) HELO, the connection can proceed and be successful. This might be why the connection is not immediately dropped. Also, I use FEATURE(`delay_checks'), which may have something to do with it.

Something else also came out of the experiments. If a connecting host violates GREETPAUSE (sends before presentation of the banner), its HELO is still passed via MILTER call to MIMEDefang.

However, if RATECONTROL is tripped, there is no MILTER call. Presumbly, this is true of CONNCONTROL.

Finally, I got asked about my filter_helo code. My current filter has a *lot* of logging statements, because I've been experimenting and need to meter its function. I'm also not a Perl hacker, so I doubt my code is the most-efficient way to write this. Here it is...feel free to use/adapt the code as may suit your needs, or ignore my code and write your own:

# Some global variables used by the filter* functions
###############################
# Declare a hash of
#       - Key: IP addresses we consider internal
#       - Value: Flag as to if host is exempt from AV scans (0=No, 1=Yes)
###############################
%OurHosts=(     "127.0.0.1", 0,
                "192.168.2.2", 0,
                "10.2.3.4", 0 );

###############################
# Declare a hash of
#       - Key: Domain Names we host
#       - Value: A flag as to if the Domain should be
#                       receiving E-Mail (0=No, 1=Yes)
###############################
%OurDomains=(   "mydomain.tld", 1,
                "otherdomain.tld", 1,
                "notadomain.tld", 0 );

[..other code..]

#***********************************************************************
# %PROCEDURE: filter_helo
# %ARGUMENTS:
#  IP address of remote host; hostname of remote host; HELO string
#  presented by remote host
# %RETURNS:
#  2-5 element array (see documentation)
# %DESCRIPTION:
#  Called after SMTP connection has been established and sending host has
#  given a HELO statement, but not MAIL FROM: or RCPT TO:
#***********************************************************************
sub filter_helo ()
        {
        # Read the parameters passed to the function
        my($hostip, $hostname, $helo) = @_;

        # Local string for Domain name processing
        my($domainstring);
        # Local variable for string indexing
        my($subindex)=0;

        # Search the list of our hosts using the $hostip argument
        if ( exists($OurHosts{$hostip}) )
                {
                # Recognize our internal host
                md_syslog('info', "Internal Host $hostip HELO $helo");
                # Don't look at it further
                return('CONTINUE', 'ok');
                }
        else
                {
                # Foreign host
                md_syslog('info', "Foreign Host $hostip HELO $helo");
                }

        # Check if the HELO is an IP address
        if ($helo =~ /^(\[?)(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})(\]?)$/ )
                {
                # HELO looks like an IP - the comparison will split the string
                #       into 3 variables; $1 will have [ or be undefined, $2 
will
                #       have the IP address without any brackets, $3 will have
                #       ] or be undefined ($1 and $3 are undefined if HELO 
lacked
                #       square brackets)
                md_syslog('info', "IP HELO $helo");

                # Check #0
                # The IP address portion should *not* be identical to the
                #       original HELO string - if it is, the original HELO 
lacked
                #       brackets and therefore is invalid (this is "safer" than
                #       trying to evaluate $1 and $3 directly, as they may be
                #       undefined, or have garbage from a previous iteration)
                if ( $2 eq $helo )
                        {
                        # Reject connection - invalid HELO
                        md_syslog('alert', "Invalid HELO $helo by Host 
$hostip");
                        return('REJECT', "INVALID HELO/EHLO: $helo is not 
valid");
                        }

                # Check #1
                # Since the HELO was an IP address, it should match the host's 
IP
                if ( $2 ne $hostip )
                        {
                        # Reject connection - fraudulent HELO
                        md_syslog('alert', "Fraudulent HELO $helo by Host 
$hostip");
                        return('REJECT', "FRAUDULENT HELO/EHLO: $helo is not 
$hostip");
                        }
                }
        else
                {
                # HELO looks like a host name string
                md_syslog('info', "Non-IP HELO $helo");

                # Check #2
                # If the HELO is a Domain Name, it will contain at least one "."
                if ( index($helo, ".") == -1 )
                        {
                        # Reject connection - invalid HELO
                        md_syslog('alert', "Invalid HELO $helo by Host 
$hostip");
                        return('REJECT', "INVALID HELO/EHLO: $helo is not 
valid");
                        }

                # Check #3
                # HELO should not contain "localhost"
                if ( $helo =~ /localhost/i )
                        {
                        # Reject connection - invalid HELO
                        md_syslog('alert', "Invalid HELO $helo by Host 
$hostip");
                        return('REJECT', "INVALID HELO/EHLO: $helo is not 
valid");
                        }

                # Check #4
                # If the HELO is an FQDN, the index and rindex of "." will not 
be the same
                # This catches the spammer using domain.tld (which will slip
                #       by Check #2)
                if ( index($helo, ".") == rindex($helo, ".") )
                        {
                        # Reject connection - invalid HELO
                        md_syslog('alert', "Non-FQDN HELO $helo by Host 
$hostip");
                        return('REJECT', "INVALID HELO/EHLO: $helo is not 
FQDN");
                        }

                # Check #5
                # HELO should not be a hosted Domain
                $domainstring=$helo;
                while ( index($domainstring, ".") != rindex($domainstring, ".") 
)
                        {
                        # Extract the substring of text after (+1) the first "."
                        $subindex=(index($domainstring, ".")) + 1;
                        $domainstring=substr($domainstring, $subindex);
                        if ( exists($OurDomains{$domainstring}) )
                                {
                                # Reject connection - fraudulent HELO
                                md_syslog('alert', "Fraudulent HELO $helo by Host 
$hostip");
                                return('REJECT', "FRAUDULENT HELO/EHLO: $hostip is 
not $helo");
                                }
                        }
                        # END OF WHILE

                # If we reach here, the loop has ended due to the $helo string 
being
                # pared down to just Domain and TLD, without a match - the HELO 
is
                # not trying to impersonate a hosted Domain
                }
                # End of IF

        # At this point, we've eliminated all the obvious fraudulent HELOs

        # HELO has passed all checks
        md_syslog('alert', "Accepted HELO $helo by Foreign Host $hostip");
        return('CONTINUE', 'ok');
        }
        # End of filter_helo

As I wrote previously, my entire filter is heavily logged. My analysis of those logs indicates that only about 50% of foreign mailhosts connecting to my network get past HELO. Based on the I-think-reasonable assumption that no "legitimate" mail server would be tripped up by GREETPAUSE, RATECONTROL, CONNCONTROL or the tests I have in filter_helo, my conclusion is that those 50% are spammers, and I'm effectively stopping them by the end of HELO.
_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to