bypassing invalid helo

2022-03-07 Thread Alex
Hi, I have what appears to be a machine-generated email that's sending with an invalid hostname and invalid helo hostname. In lieu of being able to have the sender fix their broken email, I'd like to add entries to bypass these checks for this specific host. I don't otherwise have a trust relation

Re: bypassing invalid helo

2022-03-07 Thread Viktor Dukhovni
On Mon, Mar 07, 2022 at 03:31:43PM -0500, Alex wrote: > Mar 7 13:25:36 armor postfix-113/smtpd[4009829]: NOQUEUE: reject: > RCPT from unknown[173.213.231.144]: 504 5.5.2 : Helo command > rejected: need fully-qualified hostname; from=<> > to= proto=ESMTP helo= > > reject_non_fqdn_helo_hos

Re: bypassing invalid helo

2022-03-07 Thread Alex
> > Mar 7 13:25:36 armor postfix-113/smtpd[4009829]: NOQUEUE: reject: > > RCPT from unknown[173.213.231.144]: 504 5.5.2 : Helo command > > rejected: need fully-qualified hostname; from=<> > > to= proto=ESMTP helo= > > > > reject_non_fqdn_helo_hostname, > > > It also appears that smtpd_helo

Re: bypassing invalid helo

2022-03-07 Thread Viktor Dukhovni
On Mon, Mar 07, 2022 at 07:05:53PM -0500, Alex wrote: > > Replace "reject_non_fqdn_helo_hostname" with: > > > > main.cf: > > pcre = pcre:${config_directory}/ > > > > # In the client, helo, sender or recipient restriction list > > smtpd_..._restrictions = > >