Mailing List Archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [tlug] state of the art spam filtering



Moin,

On Wed, 17 Mar 2010 01:30:00 +0100
Francois Cartegnie <fcartegnie@example.com> wrote:

> 
> > > * Reject senders with reverse subdomain containing blacklisted works (ex:
> > > *dyn*.foo.com, *dsl*.foo.com, *ppp*.foo.com, ...)
> > 
> > No it doesn't. What about the genuine people sending from a subdomain
> > like that? They might be 99% spammers, 1% genuine, but this is still
> > throwing away real email.
> 
> Who sends mail from a dynamic/dialup/customer ip today ? 

I do. And quite a few of my (nerdy) friends do.

> Every dyn ip can send 
> mail through the isp's servers. Customers outgoing port 25 is even blocked by 
> ISP today.
 
Yes, that's why more and more worms/troyans use the setting of outlook
to send mails, so they can go over the ISPs MTA, which makes it legitimate
for quite a lot of MXs

> As you're mentioning, that's 99% chance of being crap. But I never saw the 
> remaining 1%.
> If it's legitimate, they'll have to manage to get their server on a regular 
> subdomain, with a regular reverse. (a dyn IP is not a stable MX for receiving 
> replies !)

Judging from the logs of the MPlayer/FFmpeg mailinglist server, that's about
30% of mail. Most of which are by the developers themself. So if i'd block
dyn IP users, i'd block the people who are the most legitimate users of
the mailinglist.


> Now, remembering that RBLs exists, you'll have the risk of receiving a 
> blacklisted IP, and won't have any authority to request a delisting.

That's the reason why most people consider RBLs a broken as designed
solution. It breaks a previously working and legitimate use of the internet.
 
> > > * Mails to non-exiting accounts goes to blackhole. Never bounce anything.
> > 
> > So, how do users discover they mis-typed an address? Won't they just
> > assume fcartenie@example.com is ignoring them deliberately?
> 
> If you have a single MTA that can check of the account before accepting the 
> mail, this is not a problem. 

It is possible with multiple MXs too. At least postfix can do that.
And it's highly recommended too.

> If you're a relay or your MTA can't check before accepting, you'll end up 
> bouncing the message... Once a spammer notice this, he'll use it to spread his 
> content using your own server.
> http://www.backscatterer.org/?target=backscatter
> 
> As long as the sender can't be certified (domainkeys,dkim), there's no clean 
> way to fight bounce spam today: Reject or Drop. Don't bounce.

I very much doubt this. Though sender authetification (something working,
not domainkeys or dkim or any other of these patchy solve-one-single-symptom
solutions) might be the best solution.

			Attila Kinali

-- 
If you want to walk fast, walk alone.
If you want to walk far, walk together.
		-- African proverb


Home | Main Index | Thread Index

Home Page Mailing List Linux and Japan TLUG Members Links