As far as I know it just "limit" the commands that you can send to the mail 
server, you just have to be sure if you are using ESMTP or SMTP. Here's the 
link explaining how it works.

All the customers of our company uses that inspect, the common issue is with 
proofpoint. Every other MTA is accepted without issues.

Just a thought.

This is the TAC's point of view.

the inspect SMTP could drop those emails that carry unsupported commands such 
as ATRN, ONEX, VERB, CHUNKING

You may verify this if you run captures on the outside and inside interface of 
the ASA.

“”
The inspect esmtp command includes the functionality previously provided by the 
fixup smtp command, and provides additional support for some extended SMTP 
commands. Extended SMTP application inspection adds support for these extended 
SMTP commands, including AUTH, EHLO, ETRN, HELP, SAML, SEND, SOML, STARTLS, and 
VRFY. Along with the support for seven RFC 821 commands (DATA, HELO, MAIL, 
NOOP, QUIT, RCPT, RSET), the adaptive security appliance supports a total of 
fifteen SMTP commands.

Other extended SMTP commands, such as ATRN, ONEX, VERB, CHUNKING, and private 
extensions and are not supported. Unsupported commands are translated into Xs, 
which are rejected by the internal server. This results in a message such as 
"500 Command unknown: 'XXX'." Incomplete commands are discarded.
“”

Here is the documentation that talks about it
http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1742723



Saludos. 
  
              
  
Ing. Alfonso Alejandro Reyes Jiménez 
    Coordinador de Seguridad - SASI
E-mail: aare...@scitum.com.mx 
Telefono: 91 50 74 89
Movil: (044) 55 85 81 04 62



-----Mensaje original-----
De: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] En 
nombre de Jeroen Geilman
Enviado el: viernes, 09 de diciembre de 2011 01:02 p.m.
Para: postfix-users@postfix.org
Asunto: Re: CISCO breaks DKIM on their ASA/PIX (again)

On 2011-12-09 19:57, Ralf Hildebrandt wrote:
> * Jeroen Geilman<jer...@adaptr.nl>:
>> On 2011-12-08 09:53, Ralf Hildebrandt wrote:
>>> Over the last few days I discussed SMTP delivery problems with a 
>>> czech site which was using Postfix and a CISCO ASA with "smtp 
>>> protocol fixup" enabled.
>> smtp fixup is evil and should have died out years ago.
> No shit, sherlock :)
>   

I am in no way implying that you did anything wrong!

It's just that I cringe every time I see this enabled and when I ask after it 
the answer is usually a variant on "oh it's a security option offered by a 
Cisco firewall, of course we enable it! Why not?"

Cisco themselves are mostly to blame for this by not disabling it by default - 
unless they do so by now, I haven't kept up...

--
J.

Reply via email to