Scott Brady wrote:
> ----- Original Message -----
> From: Jochem van Dieten
> Date: Sat, 25 Sep 2004 02:11:20 +0200
>
>> That is no protection against relaying, there is a reason why all
>> the standard relay tests use addresses from a local domain.
>> Everybody can fake an email address (isn't that what you are
>> doing yourself?).
>
> No, we're using a real address.  The mail server is set to require a
> real account (which is why the from address is
> "[EMAIL PROTECTED]" - that's a real account). Of course,
> that doesn't prevent spammers from trying to use our domain with that
> e-mail address (which is probably a pretty common account name).

[EMAIL PROTECTED] is required to exist. So if that is all,
there is a 100% guaranteed way to bypass your relay 'protection'.

>> Fix your mailserver, it is easier.
>  
> For now, the mail server isn't under out control.  I've only recently
> joined the company, but aparently the relay setting is a fairly recent
> one.  In the next two months, we're changing hosts and to a dedicated
> hosting solution (where we'll have more control).  From what I
> understand, our current settings are much like any other "prevent
> relay" settings that I'm aware of, where the from addresses have to be
> actual accounts.

Relay settings are almost always:
- allow if from our IP space
- allow if authenticated

The from address is fakeable and thus not an acceptable way to
authenticate.

> Based on what you've said, my guess is that MS Exchange is the
> culprit.

Close port 25 on the CF machine for everything except localhost
using a firewall, then run IIS SMTP on it and relay your email
through there.

Jochem
[Todays Threads] [This Message] [Subscription] [Fast Unsubscribe] [User Settings] [Donations and Support]

Reply via email to