On Sun, Apr 28, 2013 at 11:10:10PM -0500, Stan Hoeppner wrote:

> > There is an important difference, which is why the defer variant
> > is used as a safety net, and the use-case is precisely when the
> > client is an MTA.
> 
> Apparently I didn't make my point clear, which is that a hard fail isn't
> necessary here, and that a temp fail is preferable to cover all client
> types.  I think Reindl was advocating a hard fail.  I was countering his
> argument.

Well, the hard fail is typically a good idea once one is sure the
restrictions contain all the required permits.  Some sites may
depend on check_client_access or check_recipient_access table
lookups to handle cases more complex than permit_mynetworks or
permit_auth_destination.

The point of the safety net is to give the site some time to notice
before lots of mail bounces.

If you're advocating leaving the defer safety net on all the time,
in the case of relay permissions this is arguably not entirely
unreasonable.  One could argue that legitimate MTAs that queue and
retry mail deliveries are not easily fooled into using some other
MTA as an unauthorized relay, and that the relay restrictions should
not reject mail for which the receiving MTA is an MX host.

So in that sense, this particular safety net may also be usable on
a long-term basis.  The main problem case is with ISP MTAs that
support relaying by authorized clients, when a client is misconfigured
to continue to use the original MTA after switching ISPs or after
a password reset...  Then the client may keep trying to send
repeatedly.

A soft fail is in this case a feature from the perspective of the
misconfigured client, but may increase load at the ISP if the client
generates enough traffic.  All in all, perhaps a rather small risk,
since clients liable to be misconfigured this way are unlikely to
constitude a substantial fraction of the ISPs mail load.

-- 
        Viktor.

Reply via email to