<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to handle sendmail spoof in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534985#M17316</link>
    <description>All,&lt;BR /&gt;I am using spamassassin, it catches most of the spam.  But if a user is spoofing my sendmail, for example:&lt;BR /&gt;the domain which my mail server answer to is "mydomain.com". What happen is mail from outside  is faking my mail server out by having the from field set to someuser@mydomain.com.  Isn't there something in the sendmail config which makes sure that email from outside of my network that have mydomain.com in it is a spoof email?&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Sat, 30 Apr 2005 09:46:19 GMT</pubDate>
    <dc:creator>K.C. Chan</dc:creator>
    <dc:date>2005-04-30T09:46:19Z</dc:date>
    <item>
      <title>how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534982#M17313</link>
      <description>All,&lt;BR /&gt;I am getting spoof email from outside, the from field: fake.user@mydomain, shows that the email is coming from us; how would one counter measure this sort of spoof?  Thanks.</description>
      <pubDate>Fri, 29 Apr 2005 11:14:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534982#M17313</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2005-04-29T11:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534983#M17314</link>
      <description>Does the 'mydomain' exist?&lt;BR /&gt;&lt;BR /&gt;There's an option in the sendmail configuration to not accept mail from unresolvable domains.  Start by making sure you don't have that enabled.&lt;BR /&gt;&lt;BR /&gt;Next is to enable spam filtering using spamassassin or some other method.&lt;BR /&gt;&lt;BR /&gt;There should be RPM's for any RedHat/Fedora system to do this, and the instructions are fairly easy to follow.</description>
      <pubDate>Fri, 29 Apr 2005 18:40:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534983#M17314</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-04-29T18:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534984#M17315</link>
      <description>Hi KC,&lt;BR /&gt;&lt;BR /&gt;To block unwanted domains, I put the following entry in my sendmail.mc:&lt;BR /&gt;dnl # Anti spam&lt;BR /&gt;FEATURE(`enhdnsbl', `bl.spamcop.net', `"Spam blocked see: &lt;A href="http://spamcop.net/bl.shtml?" target="_blank"&gt;http://spamcop.net/bl.shtml?&lt;/A&gt;"$&amp;amp;{client_addr}', `t')dnl&lt;BR /&gt;&lt;BR /&gt;In that list there are world-wide rejected domains. Very handy dandy!&lt;BR /&gt;Don't forget to rebuild your sendmail.cf with the new configuration!&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;&lt;BR /&gt;Renarios</description>
      <pubDate>Sat, 30 Apr 2005 06:50:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534984#M17315</guid>
      <dc:creator>renarios</dc:creator>
      <dc:date>2005-04-30T06:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534985#M17316</link>
      <description>All,&lt;BR /&gt;I am using spamassassin, it catches most of the spam.  But if a user is spoofing my sendmail, for example:&lt;BR /&gt;the domain which my mail server answer to is "mydomain.com". What happen is mail from outside  is faking my mail server out by having the from field set to someuser@mydomain.com.  Isn't there something in the sendmail config which makes sure that email from outside of my network that have mydomain.com in it is a spoof email?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 30 Apr 2005 09:46:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534985#M17316</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2005-04-30T09:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534986#M17317</link>
      <description>remove 'mydomain.com' from /etc/mail/access, and re-make the access db (cd /etc/mail;make).&lt;BR /&gt;&lt;BR /&gt;You should only relay based on local-net subnet's only, and 'accept' for 'mydomain.com' only (which isn't done in 'access').</description>
      <pubDate>Sat, 30 Apr 2005 10:47:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534986#M17317</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-04-30T10:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534987#M17318</link>
      <description>Stuart, &lt;BR /&gt;I have done that already, and I noticed two other which have the mydomain entry in it:&lt;BR /&gt;&lt;BR /&gt;local-host-names&lt;BR /&gt;relay-domains&lt;BR /&gt;&lt;BR /&gt;I would think it would be o.k to take it out from there?  Thanks.</description>
      <pubDate>Sun, 01 May 2005 09:21:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534987#M17318</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2005-05-01T09:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534988#M17319</link>
      <description>Remove it from 'relay-domains'.. but assuming you've updated Sendmail recently, it should be in use.</description>
      <pubDate>Sun, 01 May 2005 18:58:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534988#M17319</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-05-01T18:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534989#M17320</link>
      <description>Stuart,&lt;BR /&gt;I believe I need "mydomain.com" to be in "relay-domains" file, otherwise user (users on our network, mydomain.com) will get 550 error when trying to send mail out.</description>
      <pubDate>Mon, 02 May 2005 12:34:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534989#M17320</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2005-05-02T12:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534990#M17321</link>
      <description>There are lots of indirect counter measures.&lt;BR /&gt;&lt;BR /&gt;One of the best is to see if the sender has a reverse lookup domain.  Here is a thread that tells how to do that.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=450771" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=450771&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 02 May 2005 15:34:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534990#M17321</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-05-02T15:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534991#M17322</link>
      <description>If it's a recent version of sendmail (i.e. less than 3 years old), then no.  you should only need the IP's that the users are sending from in the access as a 'relay'.&lt;BR /&gt;&lt;BR /&gt;If they are sending from the outside world, not just internally, then you need to implement some other verification steps, i.e. SMTP auth for those external connections.</description>
      <pubDate>Mon, 02 May 2005 20:10:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534991#M17322</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-05-02T20:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534992#M17323</link>
      <description>Stuart,&lt;BR /&gt;so if all my servers are NATED, e.g: network of "192.168.10.", then putting this in the relay-domain file will allow all internal pc/servers to mail outside of our network and still be able to recieve email from outside? This will stop the spoof of "mydomain.com" from outside, if they try, they will get a 550 error?  Please confirm before I attempt to modify the relay-domain file.  Thanks.</description>
      <pubDate>Tue, 03 May 2005 09:58:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534992#M17323</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2005-05-03T09:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534993#M17324</link>
      <description>It should.&lt;BR /&gt;&lt;BR /&gt;But given the names of the files involved, I'd start by updating Sendmail.&lt;BR /&gt;&lt;BR /&gt;Many many versions ago, all the access and relay information was combined into the single database 'access.db' (via 'access'), using the keywords 'RELAY' and 'OK'.&lt;BR /&gt;&lt;BR /&gt;It also has the control to allow 'To:' acceptance i.e. from my box:&lt;BR /&gt;&lt;BR /&gt;xxx.29.19.45                    RELAY&lt;BR /&gt;xxx.29.19.46                    RELAY&lt;BR /&gt;To:bekar.xx.xx                  OK&lt;BR /&gt;&lt;BR /&gt;But I also have my box using SMTPAuth for my mobile phone.. :)</description>
      <pubDate>Tue, 03 May 2005 19:26:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534993#M17324</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-05-03T19:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534994#M17325</link>
      <description>Stuart,&lt;BR /&gt;in the relay-domain file, could I use something like: "192.168.10." and "10.10.10." in place of "mydomain.com"?  Thanks.</description>
      <pubDate>Wed, 04 May 2005 17:14:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534994#M17325</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2005-05-04T17:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534995#M17326</link>
      <description>That should be fine, yes.&lt;BR /&gt;&lt;BR /&gt;Just don't forget to re-make the hash-databases after changing the contents.</description>
      <pubDate>Wed, 04 May 2005 19:24:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534995#M17326</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-05-04T19:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: how to handle sendmail spoof</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534996#M17327</link>
      <description>Thanks,&lt;BR /&gt;I will see if I can make the changes Today; will let you know it goes.</description>
      <pubDate>Thu, 05 May 2005 08:29:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-handle-sendmail-spoof/m-p/3534996#M17327</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2005-05-05T08:29:07Z</dc:date>
    </item>
  </channel>
</rss>

