On Feb 17, 2006, at 02:07, Elliot Foster wrote:
John Peacock wrote:
Elliot Foster wrote:
You could also use port 587 (submission) non-ssl if you're just trying to get around port 25 being blocked. That way you wouldn't have to re-route the connections to localhost. You would also be able to retain the connecting IP.
But then I'd have to run a second instance of qpsmtpd in that case (since I don't see any support for running on two ports in the existing code).
Or do some port forwarding trickery, but that becomes clumsy, and not intuitively maintainable. Does the trunk (or forkserver) have code that allows it to listen on multiple ports/interfaces/ips?

I think I will look into running a second instance. Actually I only need a second instance of the config/ directory, the rest is the same. I will only allow AUTH'd connections over TLS, and I will not run any of the standard plugins (it's only me sending; other admins may want to run virus and/or spam checking) but plugins fir HashCash addition and DomainKeys signing (once I get that to work) instead.

I used stunnel for a while, but I didn't like not being able to tell from where someone was connecting.
I'm assuming the "some stupid admins" part was a joke? Or are they blocking on SPF soft failures?
No joke. I don't think that SPF is ready to be used to block mail (hard *or* soft failure). The one site is running some M$loth anti-spam feature for Exchange and I get no reason back why they are blocking. I have our SPF records set to hard fail and so far I have exactly 1 domain that blocked the mail (which shows exactly how useless SPF is)...
If anyone ever forges an email to me that says it's from you, I'll be domain #2. :) I don't block soft failures, but I'm using it to block phishing scams trying to deliver messages to my users, pretending to be [EMAIL PROTECTED] (or somesuch) I tend to get a lot of those.

I have stopped a sizeable amount of paypal phishing attempts using SPF, so I think it is starting to work (I also added paypa1.com, paypaI.com and paypall.com to badmailfrom). I can't give you the exact number of messages stopped (because it's a softfail so they retry over and over again) but it's more than 10 and less than 100.

-Johan

Reply via email to