Deutsch English Français Italiano |
<vla1k6$o3g$1@tncsrv09.home.tnetconsulting.net> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.omega.home.tnetconsulting.net!not-for-mail From: Grant Taylor <gtaylor@tnetconsulting.net> Newsgroups: comp.mail.sendmail Subject: Filtering HELO / EHLO names before MAIL FROM Date: Fri, 3 Jan 2025 19:07:18 -0600 Organization: TNet Consulting Message-ID: <vla1k6$o3g$1@tncsrv09.home.tnetconsulting.net> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sat, 4 Jan 2025 01:07:18 -0000 (UTC) Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="omega.home.tnetconsulting.net:198.18.1.11"; logging-data="24688"; mail-complaints-to="newsmaster@tnetconsulting.net" User-Agent: Mozilla Thunderbird Content-Language: en-US Bytes: 1413 Lines: 17 Hi, Is there a method that I can use to filter & reject (return a 5xy error) for bad HELO / EHLO names at HELO / EHLO time? I see some options (FEATURE(`block_bad_helo')) but they seem to apply later in the SMTP transaction. I'm seeing what I suspect is bots looking to do credential stuffing, but I'm not offering authentication on this system, so they are bailing before usual protections would kick in. Initial searches haven't turned up much that happens before MAIL FROM. -- Grant. . . .