Paweł Leśniak a écrit :
> Jim Wright pisze:
>>> Jan 26 13:05:42 mail postfix/policy-spf[2500]: : Policy
>>> action=PREPEND Received-SPF: none (server.hipwah.com: No applicable
>>> sender policy available) receiver=mail.example.com; identity=helo;
>>> helo=SERVER.hipwah.com; client-ip=202.134.118.114
>> reject_unknown_hostname
>>
>> SERVER.hipwah.com has no DNS A or MX record.
>>
> [r...@mail postfix]# host server.hipwah.com
> Host server.hipwah.com not found: 3(NXDOMAIN)
> [r...@mail postfix]# host -t mx server.hipwah.com
> Host server.hipwah.com not found: 3(NXDOMAIN)

there is no point checking the MX of a helo name (and it's even more
useless when the domain does not exist!)

> [r...@mail postfix]# host -t mx hipwah.com
> hipwah.com mail is handled by 5 mail.hipwah.com.
> [r...@mail postfix]# host mail.hipwah.com
> mail.hipwah.com has address 202.134.118.114
> 
> 
> I may be wrong, but I think I should not block sender on helo basis?
> Jan 26 13:05:41 mail postfix/smtpd[2432]: connect from
> static-ip-114-118-134-202.rev.dyxnet.com[202.134.118.114]
> Jan 26 13:05:42 mail postgrey[1086]: action=pass, reason=triplet found,
> delay=727, client_name=static-ip-114-118-134-202.rev.dyxnet.com,
> client_address=202.134.118.114, recipient=u...@example.com
> 
> From my point of view it looks like reject_unknown_helo_hostname is far
> to agressive, while reject_unknown_client_hostname and
> reject_unknown_reverse_client_hostname would both permit this mail.
> Correct me please if I'm wrong.
> 

reject_unknown_helo_hostname would indeed be too aggressive. but you
could use restriction classes and only call it if the sender is null (<>).

or you could run aggressive checks if the client has a "generic" reverse
dns. or in this particular case, simply reject *.rev.dynxnet.com with a
check_client_access:
rev.dynxnet.com         REJECT blah blah
.rev.dynxnet.com        REJECT blah blah


Reply via email to