Re: Firewall and NAT

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2004-11-01 at 18:55, Leonard Isham wrote:
> I suspect that these are the reasons sendmail.org recommends firewalling MSA:
> 
> Meant to be less strict on standards compliance
>     * Addresses don't have to be fully qualified
>     * Hostnames don't have to be fully qualified
>     * Don't require "required" headers, e.g. Message-ID: and Date: 

Having thought about this overnight, I've come to the conclusion that
the advice on firewalling off the MSA port is to prevent opening up what
is effectively a "second MTA" that could be tried by spammers/viruses
etc. when attempting to deliver mail to domains handled by that mail
server, i.e. to try to avoid spam/virus checkers that could be running
on the MTA but probably not on the MSA. Sendmail's default configuration
creates an MSA that does the same job that the MSP (Message Submission
Program) does for locally-generated mail, i.e. fully-qualifying
addresses, hostnames etc. as you mentioned above, in preparation for
sending mail out on to the Internet. However, it does nothing to prevent
any external client from connecting to it and using it to present mail
for local delivery. Hence the advice of firewalling it off from external
clients. However, there is another way to prevent this, i.e. by setting
up the MSA with the "a" daemon flag, like this:

FEATURE(`no_default_msa')dnl
DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl

The "a" flag makes the MSA require authentication from any client
connecting to it. This is how to ensure that only genuine roaming users
with the right username/password can access the MSA, without leaving it
open to anybody attempting local delivery. This setup allows roaming
users to always use the same mail sending settings in the mail clients,
which will work from wherever they are, even ISPs that block outbound
port 25.

The Security Considerations section of the Message Submission RFC
(http://www.faqs.org/rfcs/rfc2476.html - see section 9), appears to
support this viewpoint:

   Separation of submission and relay of messages can allow a site to
   implement different policies for the two types of services, including
   requiring use of additional security mechanisms for one or both.  It
   can do this in a way which is simpler, both technically and
   administratively.  This increases the likelihood that policies will
   be applied correctly.

   Separation also can aid in tracking and preventing unsolicited bulk
   email.

   For example, a site could configure its MSA to require authentication
   before accepting a message, and could configure its MTA to reject all
   RCPT TOs for non-local users.  This can be an important element in a
   site's total email security policy.

   If a site fails to require any form of authorization for message
   submissions (see section 3.3 for discussion), it is allowing open use
   of its resources and name; unsolicited bulk email can be injected
   using its facilities.

Paul.
-- 
Paul Howarth <paul@xxxxxxxxxxxx>


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux