Stephen J. Turnbull wrote:

>Geoff Shang writes:
>
> > 2.  One idea I came up with for rejecting spoofed mail is for the 
> > receiving SMTP server to somehow check if the sending one is an MX for the 
> > domain given in the From header.  Are there any obvious problems with this 
> > approach?  Is anyone actually doing this?  It seems so simple that there 
> > surely must be some reason why it's not done.
>
>It is being done, although not via the MX for the reasons Larry Stone
>gives.  What you're looking for is call "SPF" or "DKIM" (these are
>actually two different protocols, and I think with the standardization
>of DKIM, SPF is probably dead).  The way DKIM works is that hosts
>authorized to send mail from a domain are given special resource
>records in their DNS which provide a public key, and then some portion
>of the mail and/or headers is signed with an appropriate private key.


There are still sites that check SPF and will reject mail for an SPF
hardfail.

Note, if you run SpamAssassin, there is a Botnet module[1] available
that will check the MTA that delivered to the trusted local network
has full circle DNS and a host name that doesn't look like a 'home
network' name.

[1] <http://people.ucsc.edu/~jrudd/spamassassin/Botnet.tar>

-- 
Mark Sapiro <m...@msapiro.net>        The highway is for gamblers,
San Francisco Bay Area, California    better use your sense - B. Dylan

------------------------------------------------------
Mailman-Users mailing list Mailman-Users@python.org
http://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-users/archive%40jab.org

Reply via email to