On 2 Aug 2020, at 10:07, Rupert Gallagher wrote:

To ignore it, as you say, I would have to remove the postfix check, write rules to implement a non-blocking check, then write rules to implement the rejection except for whitelisted domains.

OR, in the language of Postfix configuration:

   smtpd_helo_required = yes
smtpd_helo_restrictions = check_helo_access pcre:badheloallowed, reject_unknown_helo_hostname, reject_non_fqdn_helo_hostname

And put entries into $config_directory/badheloallowed like this:

   /localhost/  PERMIT
   /invalid_hostname/ PERMIT
   /unresolvable.rbs.co.uk/ PERMIT
   /mailhost.sc.com/ PERMIT

It is a lot of work,

I just did it for you, for free. The hardest "work" was looking up a couple of bank domains for examples.

to allow a bank and an accounting firm to violate an industry standard, and still have the doubt on the authenticity of their e-mails. No thank you.

If you want to authenticate email, it needs to use some form of internal authentication such as DKIM, S/MIME or OpenPGP. Trusting the authenticity of email simply because it comes from a machine which uses a resolvable HELO in a particular domain is a naive approach unless you are *AT LEAST* using a DNS resolver that demands authenticated answers, i.e. requires DNSSEC, treating non-DNSSEC replies as meaningless.

--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not For Hire (currently)

Reply via email to