Is there a method that I can use to filter & reject (return a 5xy error)
for bad HELO / EHLO names at HELO / EHLO time?
A milter should be able to do that.
Give it a try and let us know.
Q: Is it possible to cause Sendmail to return something other than the
220 (from memory) greeting in response to the HELO / EHLO?
I'm trying milter-regex now and it seems like Sendmail still replies
with a 220 <bla> in response to the unwanted "EHLO User" that I'm
currently seeing.
Yes, esp. 421.
Maybe that's the best for your problem?
But any command other than QUIT (and a few others which do not start
a transaction) will be rejected, correct?
Hi,
Is there a method that I can use to filter & reject (return a 5xy error) for bad
HELO / EHLO names at HELO / EHLO time?
I see some options (FEATURE(`block_bad_helo')) but they seem to apply later in
the SMTP transaction.
I'm seeing what I suspect is bots looking to do credential stuffing, but I'm not
offering authentication on this system, so they are bailing before usual protections would kick in.
Initial searches haven't turned up much that happens before MAIL FROM.
`milter-cli` could do it using an `envelope-from=` filter. Failing that
I suppose I could tweak one of my other milters.
BarricadeMX has the ability (not a milter).
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (0 / 16) |
Uptime: | 164:26:38 |
Calls: | 10,385 |
Calls today: | 2 |
Files: | 14,057 |
Messages: | 6,416,518 |