[Mimedefang] OT: New Sendmail spam block

Ben Kamen bkamen at benjammin.net
Thu Mar 24 13:35:40 EST 2005


I've now run into 2 universities that are blocking email based on invalid
hostnames at the HELO sequence.

 From what I can see with RFC1123,
  (see http://www.freesoft.org/CIE/RFC/1123/90.htm) this seems to be a no-no.

> 5.2.5 HELO Command: RFC-821 Section 3.5
> 
> The sender-SMTP MUST ensure that the <domain> parameter in a HELO command
> is a valid principal host domain name for the client host. As a result, the
> receiver-SMTP will not have to perform MX resolution on this name in order
> to validate the HELO parameter.
> 
> The HELO receiver MAY verify that the HELO parameter really corresponds to
> the IP address of the sender. However, the receiver MUST NOT refuse to
> accept a message, even if the sender's HELO command fails verification.
> 
> DISCUSSION:
> 
> Verifying the HELO parameter requires a domain name lookup and may
> therefore take considerable time. An alternative tool for tracking bogus
> mail sources is suggested below (see "DATA Command").
> 
> Note also that the HELO argument is still required to have valid <domain>
> syntax, since it will appear in a Received: line; otherwise, a 501 error is
> to be sent.
> 
> IMPLEMENTATION:
> 
> When HELO parameter validation fails, a suggested procedure is to insert a
> note about the unknown authenticity of the sender into the message header
> (e.g., in the "Received:" line).


I'd ask the sendmail usenet group - but it tends to be clogged with more 
neophyte questions... plus, this item is about spam control which is more on 
que with what most of us do here with sendmail - so I'm hoping for a more 
solid answer based on use than user-guides.


Thanks,

  -Ben




More information about the MIMEDefang mailing list