On Mon, 2009-06-29 at 08:20 -0400, Charles Marcus wrote:
> On 6/29/2009, Steve (steve.h...@digitalcertainty.co.uk) wrote:
> > I've read a few archive posts regarding the generation of bounce/ndr
> > messages and I can understand some of the cutting remarks such as
'don't
> > accept mail for invalid users in the first place'.
> 
> Yep - but accepting for invalid users is different from your problem
> described below of bouncing due to failing CONTENT inspection...
> 
> > That aside, is it actually possible to stop the SENDING (or the
> > generation) of NDR/Bounce messages.
> 
> It might be possible to do this ONLY for messages that fail the
content
> inspection, but otherwise, postfix doesn't 'send' NDRs, it simply
> rejects the message at smtp time - it is the ORIGINATING server (the
one
> that SENT the message) that generates the NDR.
> 
> If your server is accepting then bouncing, something is broken... fix
> the problem.
> 
> I don't do it, but I think you can have a before queue content filter
> using amavisd-new and spamassassin...
> 
> > I have a couple of content milters / filters running that hold the
mail
> > during the data stage and inspect it. I appreciate that the RFC's
say
> > the decision needs to be made before the DATA section - but that is
not
> > always ideal.
> 
> The rule is simple... if you accept the message, don't bounce it
> afterwards, but if you must for some specific reason accept a message
> and then reject it for whatever reason afterwards, the RFC requires a
> bounce (I think). The best way to deal with this is if you accept the
> message and then it fails some content inspection, just tag it and
> deliver to a spam folder or something.
> 
Appreciate that - but to do this defeats the object of rejecting mail at
SMTP time (to avoid the bounce in the first place). What appears to
happening is the spambot sending the mail does not hang around for the
250 OK at the end of the <lf>.<lf>. If it did, it would have been SMTP
rejected. (no bounce ever needed).

Sure - it's not RFC compliance to *not* bounce something you have
accepted responsibility for - but Postfix had not taken responsibility.
It never gave a 250 OK. I would never have given a 250 OK for the
message concerned.

I have some concern that clamsmtp may be 'misfiring' because the logs
show (127.0.0.1[127.0.0.1]:10025) it being involved. However, I can
recreate this if I telnet it and drop off without waiting for the OK
after the data.

Jun 29 08:54:27 mta1 postfix/smtp[14068]: 5B63AAC10C:
to=<andyspa...@munged>, relay=127.0.0.1[127.0.0.1]:10025, delay=2,
delays=1.2/0.01/0.06/0.76, dsn=5.7.1, status=bounced (host
127.0.0.1[127.0.0.1] said: 550 5.7.1 Blocked by Spamassassin (in reply
to end of DATA command))

But as far as I can tell, it's not given a 250 OK anywhere so it should
not have gone on to produce a bounce from the blocked message (which in
turn was 550'd);

Jun 29 08:54:27 mta1 postfix/bounce[14074]: 5B63AAC10C: sender
non-delivery notification: 60FDDAC8C2
Jun 29 08:54:27 mta1 postfix/qmgr[13983]: 5B63AAC10C: removed
Jun 29 08:54:27 mta1 postfix/qmgr[13983]: 60FDDAC8C2: from=<>,
size=4371, nrcpt=1 (queue active)
Jun 29 08:54:30 mta1 postfix/smtp[14076]: 60FDDAC8C2:
to=<adamdickinsonwat...@coolest-gadgets.com>,
relay=coolest-gadgets.com[75.127.98.32]:25, delay=3.4,
delays=0.01/0.01/3.3/0.15, dsn=5.0.0, status=bounced (host
coolest-gadgets.com[75.127.98.32] said: 550 No Such User Here" (in reply
to RCPT TO command))




Reply via email to