Rejecting Forged Headers From Foreign IP Space.
(Doc ID 2077733.1)
Last updated on SEPTEMBER 09, 2019
Applies to:Oracle Communications Messaging Server - Version 7.0.5 and later
Information in this document applies to any platform.
Customer's anti-spam vendor reports seeing a large amount of spam with SMTP HELO/EHLO forged as the customer's domain names, even though the SMTP client IP is not in a range owned by the customer.
Configure the MTA to reject sessions for IPs using the customer's domain name in the HELO/EHLO field of the MTA transaction. Allow only a specific range of IPs to HELO/EHLO using the hosted domain name.
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document