How do I block mail that uses a bogus helo command?
The bogushelo directive determines if an e-mail should be permitted even if there is an invalid host name following the SMTP helo command. RFC 1123 section 5 2.5 says it should be. However, attackers have used bogus helo commands to perform buffer over runs to hide where the e-mail actaully came from. The default value is no.
Related Questions
- When sending mail, sometimes I am getting the following error: "Helo command rejected: need fully-qualified hostname", "Transaction Failed", or "Send Hello First" errors. How can I fix this problem?
- Whenever my system filter uses a mail command to send a message, I get the error User 0 set for address_reply transport is on the never_users list. What does this mean?
- How do I block mail that uses a bogus helo command?