Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SMTP outbound best practices

    Scheduled Pinned Locked Moved Firewalling
    6 Posts 3 Posters 5.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      AudiAddict
      last edited by

      I have a open wifi subnet / adapter.

      I have some allow rules so people actually can do something on this network :)

      I am using the following rule set to allow basic access to e-mail, web etc.

      The down side is that they can receive mail and use programs like outlook (which is fine) but they are also able to SEND e-mail (spam) using a postfix server.

      What would be the best way to allow sending/receiving mail through their e-mail programs but disallow outbound mail spam? I guess I would need level 3 software to do this?
      Or should I just go ahead and disable smtp access alltogether (so they can only use http/https?)

      PS: I tried disabling all rules except port 80 hoping all traffic would go through my transparant proxy but then internet doesn't work (port 53 is being blocked). Why doesn't all traffic go through the proxy in this case including smtp/dns traffic?

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        Block outbound 25, almost all mail systems now will let clients use authenticated smtp submission over port 587 or smtps on port 465, mail clients shouldn't be using 25 directly anymore.

        For the second q, DNS does not get proxied, that still goes to the client's DNS server. If you're in transparent mode, the client doesn't know the proxy exists, and 53 doesn't get redirected, it still needs to reach the DNS server.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • D
          dhatz
          last edited by

          The decision to totally block port 25 may or may not be acceptable, depending on your audience. The way I prefer to deal with this issue is via throttling such traffic. Unfortunately pfSense doesn't offer much flexibility to configure this via its webGUI, although  the underlying PF is quite capable to do so.

          Check my previous post http://forum.pfsense.org/index.php/topic,41679.0.html and related feature request http://redmine.pfsense.org/issues/1935

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            Several major ISPs have been blocking outbound 25 for a long time now. If your mail server is local, only let it out on 25, block everyone else. If your mail server is remote, you should really be using some form of authentication and encryption on your outbound mail.

            In the cases where you cannot, you can still restrict on the destination rather than the source, just lock it down to your remote mail server IPs.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • D
              dhatz
              last edited by

              jimp, I agree with your suggestion, but keep in mind that one can do STARTTLS on port 25, as well as on 587.

              I know that some ISPs in certain countries do block port 25, but in my experience many ISPs in Europe don't and if you do block port 25 in a setup like the OP's, you will frustrate a lot of people and you should be prepared to handle a lot of support calls …

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                Just because you can do TLS there doesn't mean you should. :-)

                If you have no control over the users then it does make it much harder to filter, but even when Verizon started blocking it, people just got over it and moved on.

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.