2010/3/22 - <[email protected]>:
> --- On Mon, 3/22/10, Jakub Wasielewski <[email protected]> wrote:
>> I recently discovered some nasty backscatter technique which I  don't
>> know how to stop.  It only occurs on backup MX server (sendmail 8.14.0)
>> who checks for valid recipients using md_check_against_smtp_server().
>>
>> The SMTP session looks like this:
>>
>> Connected to xxx.xxx.xxx.130.
>> Escape character is '^]'.
>> 220 my_backup_mx ESMTP
>> helo example.com
>> 250 my_backup_mx Hello example.com [xxx.xxx.xxx], pleased to meet you
>> mail from:<[email protected]>
>> 250 2.1.0 <[email protected]>... Sender ok
>
> Here's your problem.  You haven't checked the sender against SPF.  See my Wed 
> Feb 24 2010 00:39:23 message for details on how to do this.  Forged messages 
> will be stopped here and no DSN generated.  Only non-forged messages may 
> continue.  If the sender hasn't protected his domain by creating an SPF 
> record for it, any backscatter is HIS problem, not yours.

True unless sender is a spamtrap of some dnsbl list - than you're
listed and problem is yours ;)

>> rcpt to:<[email protected]>
>> 554 5.7.1 <[email protected]>: Recipient 
>> address rejected: User unknown
>
> Since you have rejected it, you shouldn't be generating an NDR type DSN at 
> all.  You are definently misconfigured.

I definitely think so and that is why I'm writing here to find what is
wrong. I dunno if sendmail or mimedefang generates
this DSN's, it is something wrong in my sendmail.cf or in mimedefang-filter.

Cheers,

-- 
    Jakub Wasielewski
_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to