Hi,

I recently had a scan of my DSL-connected Linux box done by
http://www.dslreports.com.  I was rather surprised to see that this service
reported my system was set up as an open e-mail relay.  I quickly discovered
that it's not, really; the system just didn't know that qmail was checking local
recipients AFTER accepting the mail.  I do still have a couple of concerns. 
First, here's the relevant portion of the output of the test:

Test mail relay
To:<[EMAIL PROTECTED]> .. 553 sorry, that domain isn't in
my list of allowed rcpthosts (#5.7.1) 
To:<[EMAIL PROTECTED]> .. 553 sorry, that domain isn't in my list of allowed
rcpthosts (#5.7.1) 
To:<[EMAIL PROTECTED]@[151.203.46.57]> ..250 ok 
To <root%XX.XX.com@[151.203.46.57]> ..250 ok 
To <XX.XX.com!root@[151.203.46.57]> ..250 ok 

I gather that the last three are notations allowed by some SMTP daemons for
relay, but that qmail doesn't recognize them as such, and so tries to interpret
them as usernames, which of course fails and causes a bounce message to go out,
but only AFTER accepting the message for attempted delivery.  I have three
concerns about this behavior:

1) If the "from" address is also bogus, the bounce will bounce, and so I'll
   get a notification of the bounce.  This is fine if it's just an isolated
   incident, but I'm concerned that if some spammer tried to do a mass
   mailing through my system, I might be inundated with these messages.  I
   tried a test, and I see that I do at least get but a single message for
   multiple recipients, but what if a spammer tries sending messages
   individually, or a dozen or more messages, each to different groups?
2) If one open relay test misidentifies my system as having an open relay,
   others might.  I'd hate to get stuck on an anti-spam e-mail blacklist
   because of a misidentification like this.  (For a while, a former ISP
   of mine used an over-eager anti-spam list that blocked mail from a
   mailing list that was misidentified in a way similar to this.)  Most
   of my incoming mail should be coming through my ISP (grabbed via
   fetchmail), so this shouldn't be a big problem even if it happens,
   but some people do still seem to grab and use my "direct" address.
3) If the spammer places the recipient in the "from" field rather than
   the "to" field, the system WOULD serve as an open relay of sorts,
   albeit a very strange and undesirable one, since to the recipient,
   the e-mail would seem to be a bounce from his/her own account.  If
   nothing else, a feature like this could make the target think that
   his/her security had been compromised, and I'd rather not be a
   party to such a prank.  (Granted, such a message would be easily
   forged via more direct means, but still....)

Anyhow, I realize that giving information "up front" on working usernames on the
system is probably at least a small security risk, so I'd rather not do that,
but is there some way to refuse deliveries to usernames that match some pattern
(like anything containing an "@", "%", or "!", to kill the specific examples
used in this particular test)?

--
Rod Smith
[EMAIL PROTECTED]
http://members.bellatlantic.net/~smithrod
Author of _Special Edition Using Corel WordPerfect 8 for Linux_, from Que

Reply via email to