Solved

Help me understand SMTP server bounces and lockdown

Posted on 2003-11-15
3
481 Views
Last Modified: 2013-11-30
I'm using Win 03 Server Pro and the bundled Virtual SMTP server. I'm storing email addresses in SQL Server and sending auto verification message using a 3rd party DLL (xp_smtp_sendmail) - not exchange server or MAPI client. I need to understand what happens when a user stores an invalid email address - well formed but invalid -

It would end up in the Badmail directory?
It will re-try until Expiration timeout setting?


On the lock down side of things...

This server functions as a web server (sits in Web Service Provider farm) and needs to provide outbound mail for the local SQL Server, ASP pages and the occastional direct email from the System Admin. Given that profile, what setting should i implement to for adaquate security?

0
Comment
Question by:juststeve
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 21

Expert Comment

by:marc_nivens
ID: 9778303
If the application were to try to send an email to an invalid address via Win2k3 SMTP, the message would be NDR'd.  Badmail is for NDR's that cannot be returned to sender due to an invalid from address.  So if your application were using a bogus from address, then these messages would in fact end up in badmail.

As far as security (at the SMTP level at least) you should lock down the relay settings for the virtual server.  Make sure the list for allow relay says "only the list below", and that the local server is the only one listed.
0
 

Author Comment

by:juststeve
ID: 9778878
Thnkx. What's the DROP folder for?
0
 
LVL 21

Accepted Solution

by:
marc_nivens earned 350 total points
ID: 9784379
You can take any propery formatted message and put it in the drop folder to be queued for delivery.  SMTP enabled apps that run on the server often do this.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
This Micro Tutorial demonstrates  how Internet marketers work with competitive analysis data, and a common task in data preparation is creating separate column for domains. You will then extract from a list of URLs.

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question