open mail relay with ipv6??

2008-11-10 Thread Mark Busby
Is this an open relay using ipv6? If so how to block the ipv6 relay.
I thought after sendmail v8.9, all relay action was blocked by default.

maillog entry  
Nov 10 15:01:11 hostname sm-mta[8989]: mAAL021C008989: from=[EMAIL 
PROTECTED], size=4825, class=0, nrcpts=0, bodytype=7BIT, proto=ESMTP, 
daemon=IPv6, relay=localhost [IPv6:::1]
Nov 10 15:01:17 hostname sm-mta[8989]: mAAL021D008989: ruleset=check_mail, 
arg1=[EMAIL PROTECTED], relay=localhost [IPv6:::1], reject=451 4.1.8 Domain 
of sender address [EMAIL PROTECTED] does not resolve
Nov 10 15:01:17 hostname sm-mta[8989]: mAAL021D008989: from=[EMAIL 
PROTECTED], size=3880, class=0, nrcpts=0, bodytype=7BIT, proto=ESMTP, 
daemon=IPv6, relay=localhost [IPv6:::1]

 sockstat -6
USER COMMANDPID   FD PROTO  LOCAL ADDRESS FOREIGN ADDRESS
root sendmail   8284  5  tcp6   *:25  *:*
root sshd   1520  3  tcp6   *:5960*:*
root ntpd   1010  5  udp6   *:123 *:*
root ntpd   1010  9  udp6   fe80:6::1:123 *:*
root ntpd   1010  10 udp6   ::1:123   *:*
root syslogd927   6  udp6   *:514 *:*



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: open mail relay with ipv6??

2008-11-10 Thread Matthew Seaman

Mark Busby wrote:

Is this an open relay using ipv6? If so how to block the ipv6 relay.
I thought after sendmail v8.9, all relay action was blocked by default.


You haven't given sufficient information to say whether the machine is
an open relay or not.  We'd need to see the configuration files (well,
the .mc file that is processed to produce the eventual sendmail.cf) 
plus potentially the contents of the access DB.  However, you are 
correct: nowadays the default sendmail configuration is to block 
relaying, and you have to deliberately add configuration settings to
enable any permitted relays.  If you're using the default configuration  
shipped with FreeBSD, then it is not an open relay.


maillog entry  
Nov 10 15:01:11 hostname sm-mta[8989]: mAAL021C008989: from=[EMAIL PROTECTED], size=4825, class=0, nrcpts=0, bodytype=7BIT, proto=ESMTP, daemon=IPv6, relay=localhost [IPv6:::1]

Nov 10 15:01:17 hostname sm-mta[8989]: mAAL021D008989: ruleset=check_mail, 
arg1=[EMAIL PROTECTED], relay=localhost [IPv6:::1], reject=451 4.1.8 Domain of sender 
address [EMAIL PROTECTED] does not resolve
Nov 10 15:01:17 hostname sm-mta[8989]: mAAL021D008989: from=[EMAIL 
PROTECTED], size=3880, class=0, nrcpts=0, bodytype=7BIT, proto=ESMTP, daemon=IPv6, 
relay=localhost [IPv6:::1]


This certainly doesn't indicate a message being inappropriately 
relayed. The attempt to send the message is rejected with a permanent 
error code (ie. tell the sender to bounce the message as undeliverable 
and not to re-queue it for another attempt at delivery later).  I think 
it's also doing the correct thing and rejecting the e-mail during the 
SMTP dialog rather than accepting the message for delivery and then 
later sending a bounce-o-gram to the listed sender address.  Google for 
'backscatter spam' in order to understand why the latter course of 
action is a bad idea.



sockstat -6

USER COMMANDPID   FD PROTO  LOCAL ADDRESS FOREIGN ADDRESS
root sendmail   8284  5  tcp6   *:25  *:*
root sshd   1520  3  tcp6   *:5960*:*
root ntpd   1010  5  udp6   *:123 *:*
root ntpd   1010  9  udp6   fe80:6::1:123 *:*
root ntpd   1010  10 udp6   ::1:123   *:*
root syslogd927   6  udp6   *:514 *:*


You've got sendmail listening on all interfaces for IPv6 connections.  
This is appropriate if you expect the machine to receive incoming 
e-mails.  If that's not the case, then set sendmail_enable='NO' in
/etc/rc.conf. This will give you a send-only configuration with a 
sendmail listener bound to the loopback address (typically both ::1

and 127.0.0.1)

Cheers,

Matthew

--
Dr Matthew J Seaman MA, D.Phil.   7 Priory Courtyard
 Flat 3
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
 Kent, CT11 9PW



signature.asc
Description: OpenPGP digital signature