Postfix authentication to ComCast port 587

Ben Scott dragonhawk at gmail.com
Tue Jan 20 12:02:27 EST 2009


On Tue, Jan 20, 2009 at 9:25 AM, Michael ODonnell
<michael.odonnell at comcast.net> wrote:
> That error message about the Certificate on the line
> just before it was apparently just intended to confuse me.

  My guess: Many (most?) MTAs which are doing TLS are using
self-signed certificates.  So you'll get SMTP TLS trust errors by
default in many MTAs.  (TLS is used just to encrypt the pipe to
protect the user credentials, not to authenticate the host to the
client, so a CA PKI isn't needed.)

> This means it's going to be a PITA to keep my Postfix
> config files up to date such that they stay in sync with that
> externally visible hostname ...

  I'm no expert on Postfix, but from the logs, it appears Comcast is
rejecting your SMTP reverse-path (MAIL FROM), not your hostname
(HELO).  (Windows mail clients almost never provide a valid HELO, so I
would be amazed if Comcast would require that.)  Configure your MTA to
rewrite the reverse-path to be a valid address -- your email address
would be appropriate.

  For example, with Sendmail, I just put the following in my
/etc/mail/genericstable:

	bscott  dragonhawk at gmail.com

  I presume Postfix has a similar capability.  Exim may as well.  Anyone?

  You *really* should have a valid SMTP reverse-path anyway.  Without
it, most hosts will reject your mail, and you also won't be able to
get non-immediate DSNs (Delivery Status Notifications).

> In the past the ComCast SMTP server didn't
> care how my clients ID's themselves but that's apparently
> tightened up when using this "submission" protocol.

  I'm kind of surprised.  Validating MAIL FROM has been a best
practice, and a very common practice, for longer than a decade. I
don't think Comcast has ever let me relay mail through their systems
with a bogus SMTP reverse-path.  Are you sure this isn't something
that changed when you changed MTAs?

-- Ben


More information about the gnhlug-discuss mailing list