<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Limiting outbound sendmail users in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777174#M783563</link>
    <description>Yes, my current configuration does not talk to sessions with no reverse lookup.&lt;BR /&gt;&lt;BR /&gt;It also ends sessions if there is a discrepency between the sending server and the MX.&lt;BR /&gt;&lt;BR /&gt;Wondering how this is done:&lt;BR /&gt;The telnet session orginiates off the server&lt;BR /&gt;and this is what should be verified in&lt;BR /&gt;relay domains. Using the domian on the&lt;BR /&gt;helo message is a serious open-relay problem.&lt;BR /&gt;sendmail.mc ?? Bunny op!&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;</description>
    <pubDate>Tue, 25 Apr 2006 09:50:34 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2006-04-25T09:50:34Z</dc:date>
    <item>
      <title>Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777167#M783556</link>
      <description>One of the most annoying sendmail features is that it does not check senders.&lt;BR /&gt;&lt;BR /&gt;genericstable can be used to help form senders, but its always been possible to do this:&lt;BR /&gt;&lt;BR /&gt;telnet &lt;HOSTNAME&gt; 25&lt;BR /&gt;helo domain.com&lt;BR /&gt;&lt;ENTER&gt;&lt;BR /&gt;mail from:billybob@hpux.ws&lt;BR /&gt;&lt;ENTER&gt;&lt;BR /&gt;rcpt to:spamlist@aol.com&lt;BR /&gt;&lt;ENTER&gt;&lt;BR /&gt;data&lt;BR /&gt;&lt;ENTER&gt;&lt;BR /&gt;lots of html spam&lt;BR /&gt;&lt;ENTER&gt;&lt;BR /&gt;.&lt;BR /&gt;&lt;ENTER&gt;&lt;BR /&gt;&lt;BR /&gt;Off goes themail even though billybob is not a valid user at hpux.ws or a valid local user on the system.&lt;BR /&gt;&lt;BR /&gt;This in fact is how lots of spam is relayed.&lt;BR /&gt;&lt;BR /&gt;I seem to have stumbled onto a solution. I want to know if its been tried or if I'm crazy. I may be.&lt;BR /&gt;&lt;BR /&gt;I add entries to the access database&lt;BR /&gt;&lt;BR /&gt;myusername@hpux.ws                   OK&lt;BR /&gt;from:hpux.ws                    REJECT 550 Invalid sender or domain&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I compile hash databases for sendmail.&lt;BR /&gt;&lt;BR /&gt;Now spammer connects to sendmail and tries to send from:billybob@hpux.ws&lt;BR /&gt;&lt;BR /&gt;Gets this response:&lt;BR /&gt;550 Invalid sender or domain.&lt;BR /&gt;&lt;BR /&gt;I know this is a problem if someone outside the domain tries to send an envelope with from myuser@hpux.ws. I have no problem with this being rejected.&lt;BR /&gt;&lt;BR /&gt;This configuration limits outbound senders very nicely.&lt;BR /&gt;&lt;BR /&gt;Questions:&lt;BR /&gt;1) Have I invented something? Unlikely.&lt;BR /&gt;2) Anyone else doing it?&lt;BR /&gt;3) Have I missed anything. I can easily generate the access file with a simple script that reads genericstables, which I always felt SHOULD limit outbound senders.&lt;BR /&gt;&lt;BR /&gt;I'm a generous point giver.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;&lt;/ENTER&gt;&lt;/ENTER&gt;&lt;/ENTER&gt;&lt;/ENTER&gt;&lt;/ENTER&gt;&lt;/ENTER&gt;&lt;/HOSTNAME&gt;</description>
      <pubDate>Tue, 25 Apr 2006 07:15:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777167#M783556</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-04-25T07:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777168#M783557</link>
      <description>super idea.&lt;BR /&gt;&lt;BR /&gt;But does it also require this line:&lt;BR /&gt;&lt;BR /&gt;from :public_IP_address REJECT 550 Invalid sendor or domain&lt;BR /&gt;&lt;BR /&gt;In other words can people still relay if they mail from billybob@your_IP  ?</description>
      <pubDate>Tue, 25 Apr 2006 08:04:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777168#M783557</guid>
      <dc:creator>Steve Lewis</dc:creator>
      <dc:date>2006-04-25T08:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777169#M783558</link>
      <description>Thanks.&lt;BR /&gt;&lt;BR /&gt;Someone must have done this before right?&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 25 Apr 2006 08:13:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777169#M783558</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-04-25T08:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777170#M783559</link>
      <description>1) Have I invented something? &lt;BR /&gt;&lt;BR /&gt;Check &lt;BR /&gt;&lt;A href="http://www.sendmail.org/m4/anti_spam.html" target="_blank"&gt;http://www.sendmail.org/m4/anti_spam.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It seems to point out your example.  For S&amp;amp;G test the local user who uses your MTA as a RELAY (e.g. try to relay an e-mail from valid@hpux.ws to someone@hotmail.com). &lt;BR /&gt;&lt;BR /&gt;2) Yes.  Especially when you separate inbound and outbound MXes, you can make the strong argument that a valid internal user should never directly connect to the inbound MX; you can prevent that connection w/ the access db.&lt;BR /&gt;&lt;BR /&gt;3) Just to make sure the logic is right, test the relay as suggested in 1), but you're on the right track.  &lt;BR /&gt;check &lt;BR /&gt;local to local&lt;BR /&gt;local to remote (relay)&lt;BR /&gt;remote to local&lt;BR /&gt;&lt;BR /&gt;If you haven't, you might use the virtusertable or similar to make sure mail is receivable by addressees; if not, you can reject the e-mail outright before SMTP delivers the mail payload.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2006 08:57:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777170#M783559</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2006-04-25T08:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777171#M783560</link>
      <description>I thought of one more test you need to consider:&lt;BR /&gt;&lt;BR /&gt;With your access configuration, make sure an external SMTP connection (meaning mx.spammer.com) can't relay using a valid from address.&lt;BR /&gt;&lt;BR /&gt;Some spammers sift through the web for valid e-mail addresses, and you don't want them to be able to use your MX to relay spam.&lt;BR /&gt;&lt;BR /&gt;It might be necessary to separate inbound and outbound MXs for this technique to be valid in your environment.</description>
      <pubDate>Tue, 25 Apr 2006 09:03:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777171#M783560</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2006-04-25T09:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777172#M783561</link>
      <description>Thanks again.&lt;BR /&gt;&lt;BR /&gt;Normal relay is shut down by normal access file.&lt;BR /&gt;&lt;BR /&gt;port 25 scripting is how spammers get around the open relay. That and sendmail form abuse. &lt;BR /&gt;&lt;BR /&gt;I have a port 25 scripting problem on a server with outbound mail. Its not relay because its from localhost.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 25 Apr 2006 09:11:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777172#M783561</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-04-25T09:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777173#M783562</link>
      <description>Restrict relaying by originating ip address.&lt;BR /&gt;This should be accomplished by relay-domains.&lt;BR /&gt;&lt;BR /&gt;The telnet session orginiates off the server&lt;BR /&gt;and this is what should be verified in &lt;BR /&gt;relay domains.  Using the domian on the&lt;BR /&gt;helo message is a serious open-relay problem.&lt;BR /&gt;&lt;BR /&gt;I use Exim in preference to sendmail as &lt;BR /&gt;it is much simpler to implement.  &lt;BR /&gt;&lt;BR /&gt;Don't relay for any connections where the &lt;BR /&gt;helo domain does not pass reverse lookup&lt;BR /&gt;tests.  For now you will have to accept&lt;BR /&gt;mail which doesn't as some major mailers&lt;BR /&gt;do not pass.&lt;BR /&gt;&lt;BR /&gt;Consider implementing inbound SPF and reject&lt;BR /&gt;mail where SPF is implemented on the sending&lt;BR /&gt;domain and the sender doesn't pass.&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2006 09:24:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777173#M783562</guid>
      <dc:creator>Bill Thorsteinson</dc:creator>
      <dc:date>2006-04-25T09:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777174#M783563</link>
      <description>Yes, my current configuration does not talk to sessions with no reverse lookup.&lt;BR /&gt;&lt;BR /&gt;It also ends sessions if there is a discrepency between the sending server and the MX.&lt;BR /&gt;&lt;BR /&gt;Wondering how this is done:&lt;BR /&gt;The telnet session orginiates off the server&lt;BR /&gt;and this is what should be verified in&lt;BR /&gt;relay domains. Using the domian on the&lt;BR /&gt;helo message is a serious open-relay problem.&lt;BR /&gt;sendmail.mc ?? Bunny op!&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2006 09:50:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777174#M783563</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-04-25T09:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777175#M783564</link>
      <description>1) you haven't invented something. &lt;BR /&gt;&lt;BR /&gt;2) Many systems implemente sender&lt;BR /&gt;authentication. Usually, it involves a password.&lt;BR /&gt;&lt;BR /&gt;3) Standard authentication is as follows:&lt;BR /&gt;&lt;BR /&gt;- Outside servers can send to any addresses&lt;BR /&gt;for which the server is an MX (as configured&lt;BR /&gt;in the server. (Relay-to addresses.)  May&lt;BR /&gt;also restrict the originating addess to&lt;BR /&gt;external addresses only.  &lt;BR /&gt;If verify is enabled, only accept for &lt;BR /&gt;known addresses.  (Users in /etc/passwd,&lt;BR /&gt;aliases in /etc/aliases, other lists.) &lt;BR /&gt;Some users in /etc/passwd such as root may&lt;BR /&gt;be restricted from receiving mail.&lt;BR /&gt;&lt;BR /&gt;- Inside servers can send to any address.&lt;BR /&gt;May restrict sending  addresses based on &lt;BR /&gt;/etc/passwd or other user list.  May &lt;BR /&gt;require authorization form some or all&lt;BR /&gt;inside addresses.&lt;BR /&gt;&lt;BR /&gt;- Authorized users. Can send to inside or&lt;BR /&gt;outside addresses.  May be allowed to send&lt;BR /&gt;from outside addresses.  Sender address&lt;BR /&gt;may be restriced to authorized user if&lt;BR /&gt;only workstations require authorization.&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2006 09:51:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777175#M783564</guid>
      <dc:creator>Bill Thorsteinson</dc:creator>
      <dc:date>2006-04-25T09:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting outbound sendmail users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777176#M783565</link>
      <description>It seems to work very well.&lt;BR /&gt;&lt;BR /&gt;I've got it working on a cluster based formation.&lt;BR /&gt;&lt;BR /&gt;Only authorized users can send outbound. No impact as yet noticed on authorized users.&lt;BR /&gt;&lt;BR /&gt;Didn't cost me a dime. Just some time.&lt;BR /&gt;&lt;BR /&gt;Points inbound....&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 26 Apr 2006 15:53:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limiting-outbound-sendmail-users/m-p/3777176#M783565</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-04-26T15:53:42Z</dc:date>
    </item>
  </channel>
</rss>

