Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Darxus
On 02/15, Per Jessen wrote:
> Hmm, there does seem to be some minor issue with the underscore in A
> records, but I still think it would be the most appropriate way to go. 

Technically I agree.  However, practically, I think it might be important
to go without underscores purely due to implementation difficulties, mostly
Bind's apparent default RFC violation.

-- 
"every time I race I see god" - tsuwa, #motorcycles, EFNet, 7/19/06
http://www.ChaosReigns.com


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Per Jessen
dar...@chaosreigns.com wrote:

> On 02/15, Per Jessen wrote:
>> I checked my bind setup too, and I have the default for check-names -
>> no
>> complaints.  It is however, perhaps, worth noting that my _sip and
>> _domainkey names are for SRV records, not A records.
> 
> Yup, no problems with SRV records - either with my secondary DNS
> provider, or bind before I changed check-names to ignore.
> 

Hmm, there does seem to be some minor issue with the underscore in A
records, but I still think it would be the most appropriate way to go. 


/Per Jessen, Zürich



Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Darxus
I'm about to post about MTX to the Anti-Spam Research Group's discussion
mailing list:  http://asrg.sp.am/about/lists.shtml This appears to be
the best next step toward RFC.


MTX HELO - need to comment on this

On 02/15, Jonas Eckerman wrote:
> * Or, make a MTX checker traverse domain from the one it checks towards  
> the registry boundary when checking for policy. This means more DNS  
> lookups but might be easier to administrate. (I have a vague  
> recollection that DKIM or ADSP works this way... Not sure though)

Icky.

> "policy" seems better than "participant" to me.

Sounds good to me.  It's shorter.

On 02/14, Jonas Eckerman wrote:
> If anyone connects from a host where reverse lookup or HELO puts it in  
> "frukt.org" domain, you know that your should reject or score high  
> unless it has FCDNS and a matching MTX record.

How useful do you think it is to validate the HELO against MTX?  I'm
thinking I don't really care, and it adds extra complication.  Sure, in the
short term, it would catch some spam, but a spammer can set the HELO to
anything they want, without consequence, and can just as easily set it to
match the IP they're sending from.  Also, SPF HELO covers it.

-- 
"For gasoline vapor, the explosive range is from 1.3 to 6.0% vapor
to air...useful against soft targets such as...armored vehicles...and
bunkers." - http://www.fas.org/man/dod-101/sys/dumb/fae.htm
http://www.ChaosReigns.com


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Darxus
On 02/15, Per Jessen wrote:
> Change provider.  There is absolutely nothing wrong with having an
> underscore in DNS records.  They're used for several things - _sip and
> _domainkey  for instance.  Also see RFC2181.

RFC 2181 section 11 does seem to agree.

However, I still haven't found evidence of it ever being used in an A
record.

Also, I have SRV records with underscores that they accept just fine.

And I'm not willing to change providers for this.  If I need to change
provider, it's too great a barrier to general adoption.


On 02/15, Per Jessen wrote:
> I checked my bind setup too, and I have the default for check-names - no
> complaints.  It is however, perhaps, worth noting that my _sip and
> _domainkey names are for SRV records, not A records. 

Yup, no problems with SRV records - either with my secondary DNS provider,
or bind before I changed check-names to ignore.


On 02/15, Matus UHLAR - fantomas wrote:
> In such case you should not compare MTX with SPF and or DKIM, instead
> you should clearly state that MTX is designed to do something very
> different than SPF and DKIM are trying to do.

Good point.  I did not ever intend to say that MTX is better than SPF or
DKIM, just that MTX is better at what it is intended for which the others
are not intended for.


On 02/15, Justin Mason wrote:
> I could vaguely recall it, then someone else reminded me of the exact
> name.  There have been a lot of MARID proposals in the past...

"MTA Authorization Records in DNS."  Good acronym for me to know, thanks.
It was an IETF Working Group that was terminated in 2004:
http://www.networkworld.com/news/2004/092704ietfspam.html


-- 
"I'd rather be happy than right any day."
- Slartiblartfast, The Hitchhiker's Guide to the Galaxy
http://www.ChaosReigns.com


Re: HELO SPF + FCDNS (was: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage)

2010-02-15 Thread Matus UHLAR - fantomas
> On 2010-02-14 19:20, dar...@chaosreigns.com wrote:
>> Possibly a lack of separate SPF records for HELO and MAIL FROM if
>> they are the same.

On 15.02.10 13:58, Jonas Eckerman wrote:
> Agreed. I think they should have separated those records.

I don't see any reason. Why should we allow someone to use given name in
HELO if we won't allow them to send mail with this name in mail from (and
vice versa)?

> But then I also think they should have created an _spf subdomain from the
> start instead of using the TXT record for the domain without any special
> qualifier...


-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
2B|!2B, that's a question!


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Jonas Eckerman

On 2010-02-14 19:20, dar...@chaosreigns.com wrote:


On 02/14, Jonas Eckerman wrote:



* I think there should be a way to tell the world wether you are using
the scheme for a domain (not host) or not. This could easily be done in
DNS.



I need to think about this more, thanks for the suggestion.  (More on
registrar boundaries below.)



* I think you should follow conventions in DNS naming, using an
underscore to signify that the DNS record is a "special" type of record.
This is quite common.



That's probably a good idea, hmm.



You could use SpamAssassins registrar boundaries stuff for getting the
domain in a SA plugin, and score higher for missing MTX host record if
there is an MTX domain record.



How good is SA's registrar boundaries stuff?


Not sure, but it's used in various places if you use SA, so if it isn't 
good that will have effects on SA anyway.



I don't think
"Use SpamAssassin's registrar boundaries" would be good in an RFC.


I only meant that SA's Mail::SpamAssassin::Util::RegistrarBoundaries 
could be used for this in an SA plugin.


In the RFC I'd suggest it be specified that domain policy's should be 
checked based on domain registry boundaries (but with better wording 
than mine).



I don't even know where the record should be for wildlife.state.nh.us.
www.state.nh.us exists, which would indicate mtx.state.nh.us.


Mail::SpamAssassin::Util::RegistrarBoundaries::trim_domain returns 
"wildlife.state.nh.us" for "wildlife.state.nh.us" (and for 
"whatever."wildlife.state.nh.us"), suggesting that a policy record 
should be "policy._mtx.wildlife.state.nh.us" or similar.


Wether that makes sense or not, I don't know. It does trim for example 
"mail.microsoft.us" to "microsoft.us", so I guess there's a special 
reason for it to trim the "state.nh.us" subdomains to more than two levels.



Even if SA's registrar boundaries pointed to mtx.wildlife.state.nh.us,
you'd still need to be able to delegate to another subdomain.


Yes, you'd need that. As I see it, there are two simple ways to do this.

* Make it possible to indicate plicy delegation in the policy record. I 
see you thought about this one allready. :-)


* Or, make a MTX checker traverse domain from the one it checks towards 
the registry boundary when checking for policy. This means more DNS 
lookups but might be easier to administrate. (I have a vague 
recollection that DKIM or ADSP works this way... Not sure though)



Or maybe participant._mtx.frukt.org.  Giving an A record to the _mtx
subdomain itself seems potentially problematic,


Agreed. And seeing as a hostname should not contain underscore, that 
wasn't a very good idea of mine.

Any suggestions other than
"participant"?


"policy" seems better than "participant" to me.

Regards
/Jonas

--
Jonas Eckerman
Fruktträdet & Förbundet Sveriges Dövblinda
http://www.fsdb.org/
http://www.frukt.org/
http://whatever.frukt.org/


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Per Jessen
Matus UHLAR - fantomas wrote:

>> > On 02/14, dar...@chaosreigns.com wrote:
>> >> Now should I use _mtx, or MTAMark style _smtp._srv?
> 
>> dar...@chaosreigns.com wrote:
>> > DNS records containing underscores are apparently a pain.  In my
>> > Bind
>> > config I had to add "check-names ignore;".  My secondary DNS
>> > provider is responding with "REFUSED" (I asked them to fix it).
> 
> On 15.02.10 10:19, Per Jessen wrote:
>> Change provider.  There is absolutely nothing wrong with having an
>> underscore in DNS records.  They're used for several things - _sip
>> and
>> _domainkey  for instance.  Also see RFC2181.
> 
> note that BIND does support such names for some time, without
> problems. I have "check-namees reject" but my BIND accepts such names.


I checked my bind setup too, and I have the default for check-names - no
complaints.  It is however, perhaps, worth noting that my _sip and
_domainkey names are for SRV records, not A records. 


/Per Jessen, Zürich



HELO SPF + FCDNS (was: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage)

2010-02-15 Thread Jonas Eckerman

On 2010-02-14 19:20, dar...@chaosreigns.com wrote:


On 02/14, Jonas Eckerman wrote:



The SPF record above says that a host using "panic.chaosreigns.com"
in HELO should not be allowed to send mail unless it has the IP
address 64.71.152.40, regardless of the domain in the envelope
from, From: header, etc..



You're right, I missed that, thank you.  The complication, of course,
is where a spammer owns the (forgable) HELO domain but not the IP
(PTR). Full circle DNS handles that.  Has the combination been
implemented?


I've no idea wether any software actually checks the combination of HELO
SPF and FCDNS. It does seem a logical thing to do in software like
SpamAssassin or MIMEDefang. Maybe I should implement it in my
MIMEDefang filter just to log the results and see if it'd be a good idea
to reject on it...


Possibly a lack of separate SPF records for HELO and MAIL FROM if
they are the same.


Agreed. I think they should have separated those records. But then I 
also think they should have created an _spf subdomain from the start 
instead of using the TXT record for the domain without any special 
qualifier...


Regards
/Jonas
--
Jonas Eckerman
Fruktträdet & Förbundet Sveriges Dövblinda
http://www.fsdb.org/
http://www.frukt.org/
http://whatever.frukt.org/


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Matus UHLAR - fantomas
> > On 02/14, dar...@chaosreigns.com wrote:
> >> Now should I use _mtx, or MTAMark style _smtp._srv?

> dar...@chaosreigns.com wrote:
> > DNS records containing underscores are apparently a pain.  In my Bind
> > config I had to add "check-names ignore;".  My secondary DNS provider
> > is responding with "REFUSED" (I asked them to fix it).

On 15.02.10 10:19, Per Jessen wrote:
> Change provider.  There is absolutely nothing wrong with having an
> underscore in DNS records.  They're used for several things - _sip and
> _domainkey  for instance.  Also see RFC2181.

note that BIND does support such names for some time, without problems. I
have "check-namees reject" but my BIND accepts such names.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"The box said 'Requires Windows 95 or better', so I bought a Macintosh".


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-15 Thread Justin Mason
On Sat, Feb 13, 2010 at 11:01, Per Jessen  wrote:
> Justin Mason wrote:
>
>> On Thu, Feb 11, 2010 at 03:00,   wrote:
>>> http://www.chaosreigns.com/mtx/
>>
>>
>> It might be useful to compare with MTA MARK and see what the status of
>> that proposal currently is:
>>
>> http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/
>>http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/draft-stumpf-dns-mtamark-04.txt
>
> Amazing.  Justin, you must have known about that one - you can't
> possibly have just googled it?

I could vaguely recall it, then someone else reminded me of the exact
name.  There have been a lot of MARID proposals in the past...

--j.



-- 
--j.


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Matus UHLAR - fantomas
> On 02/13, Matus UHLAR - fantomas wrote:
> > So the only effect of MTX should be confirmation that a machine may send
> > mail? 

On 13.02.10 14:40, dar...@chaosreigns.com wrote:
> Yes.

In such case you should not compare MTX with SPF and or DKIM, instead
you should clearly state that MTX is designed to do something very
different than SPF and DKIM are trying to do.

They both were designed to prevent address forging, which is different and
often worse problem than spam itself.

You can compare MTX to mtamark and CSA but just please don't say it's better
than SPF/DKIM.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Micro$oft random number generator: 0, 0, 0, 4.33e+67, 0, 0, 0...


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-15 Thread Per Jessen
dar...@chaosreigns.com wrote:

> On 02/14, dar...@chaosreigns.com wrote:
>> Now should I use _mtx, or MTAMark style _smtp._srv?
> 
> DNS records containing underscores are apparently a pain.  In my Bind
> config I had to add "check-names ignore;".  My secondary DNS provider
> is responding with "REFUSED" (I asked them to fix it).

Change provider.  There is absolutely nothing wrong with having an
underscore in DNS records.  They're used for several things - _sip and
_domainkey  for instance.  Also see RFC2181.


/Per Jessen, Zürich



Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-14 Thread Darxus
On 02/14, dar...@chaosreigns.com wrote:
> Now should I use _mtx, or MTAMark style _smtp._srv?

DNS records containing underscores are apparently a pain.  In my Bind
config I had to add "check-names ignore;".  My secondary DNS provider is
responding with "REFUSED" (I asked them to fix it).

Is it worth the hassle to have the underscore?

-- 
"Every man, woman and child on the face of this earth is at the mercy
of chaos." - a maxwell smart movie
http://www.ChaosReigns.com


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-14 Thread Darxus
On 02/14, Jonas Eckerman wrote:
> * I think you should follow conventions in DNS naming, using an  
> underscore to signify that the DNS record is a "special" type of record.  
> This is quite common.

I didn't like this idea, but I have realized it's the right thing to do.

Now should I use _mtx, or MTAMark style _smtp._srv?

  40.152.71.64._mtx.panic.chaosreigns.com
  40.152.71.64._smtp._srv.panic.chaosreigns.com

_mtx is sexier - shorter.

_smtp._srv is potentially useful for more things, but I can't think of
anything.  Maybe google wave.  6 characters longer.  And I like that "mtx"
explicitly indicates "transmitting", although not an extremely important
distinction.  Other protocols can create their own subdomain.



On 02/14, dar...@chaosreigns.com wrote:
> Yeah.  I'm thinking of using the 4th octet to indicate participation, and
> the third octet to indicate delegation.

I screwed that up.

Not participating is functionally identical to "neutral".

4th octet: 

0 Neutral: Should not be penalized anymore than non-participating domains.
1 SoftFail: Subject to further scrutiny (greylisting, SA +1).
2 HardFail: Reject.

The existing two scores:
Pass: Obvious.
Fail: Includes all of the other results: Neutral, SoftFail, and HardFail.

3rd octet indicates delegation of 4th octet value to subdomains:
0 Applies to this domain and all subdomains.
1 Applies to this domain, ask subdomains if they're participating.


Also, I'm now less worried about domain boundaries.  Worst case, you could
check for the _mtx subdomain at the 3rd and 4th level
(_mtx.chaosreigns.com, _mtx.state.nh.us, respectively).  Are there any
cases where you need to check the 5th?  And you could use a list of known
domains to skip some guessing.

So:
_participant._mtx.chaosreigns.com. IN A 127.0.0.2

Means HardFail anything from chaosreigns.com and any subdomain that doesn't
have an MTX record.

-- 
"The whole aim of practical politics is to keep the populace alarmed --
and hence clamorous to be led to safety -- by menacing it with an endless
series of hobgoblins, all of them imaginary." - H. L. Mencken
http://www.ChaosReigns.com


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-14 Thread Darxus
On 02/14, Jonas Eckerman wrote:
> The SPF record above says that a host using "panic.chaosreigns.com" in  
> HELO should not be allowed to send mail unless it has the IP address  
> 64.71.152.40, regardless of the domain in the envelope from, From:  
> header, etc..
>
> That's not exactly the same as your MTX scheme, but it has similar  
> results when combined with a FCDNS check on HELO (providing your scheme  
> is universally adopted).

You're right, I missed that, thank you.  The complication, of course, is
where a spammer owns the (forgable) HELO domain but not the IP (PTR).
Full circle DNS handles that.  Has the combination been implemented?

SPF HELO + FCDNS's disadvantages compared to MTX are minor:

1) Complication.
2) 3 DNS lookups (HELO, PTR, SPF, possibly more if the SPF record isn't all
   IPs) instead of 2 (PTR, A).
3) Association with SPF (MAIL FROM), which people are emotional about.

Possibly a lack of separate SPF records for HELO and MAIL FROM if they are
the same.  

> If you're serious about your proposal, you should explain (in your  
> documentation) in what important way it differs from SPF as used against  
> HELO and other similar schemes, and why it is better.

I had not seen the need to specifically address SPF HELO until now, I'll do
that.

Have I missed other similar schemes?
http://www.chaosreigns.com/mtx/#comparisons


On 02/14, Jonas Eckerman wrote:
> * I think there should be a way to tell the world wether you are using  
> the scheme for a domain (not host) or not. This could easily be done in 
> DNS.

I need to think about this more, thanks for the suggestion.  (More on
registrar boundaries below.)

> * I think you should follow conventions in DNS naming, using an  
> underscore to signify that the DNS record is a "special" type of record.  
> This is quite common.

That's probably a good idea, hmm.  

> You could use SpamAssassins registrar boundaries stuff for getting the
> domain in a SA plugin, and score higher for missing MTX host record if
> there is an MTX domain record.

How good is SA's registrar boundaries stuff?  Sounds messy.  I don't think
"Use SpamAssassin's registrar boundaries" would be good in an RFC.
I don't even know where the record should be for wildlife.state.nh.us.
www.state.nh.us exists, which would indicate mtx.state.nh.us.  But it would
probably be significantly more useful at mtx.wildlife.state.nh.us.  Icky.
You could give mtx.state.nh.us a value that indicates that you should check
the subdomain (mtx.wildlife.state.nh.us).  

Even if SA's registrar boundaries pointed to mtx.wildlife.state.nh.us,
you'd still need to be able to delegate to another subdomain.

Not giving me warm fuzzies.

> To say that "marmaduke.frukt.org" [195.67.112.219] is allowed to send mail:
> 219.112.67.195._mtx.marmaduke.frukt.org. IN A 127.0.0.1
>
> To say that we're using your scheme for all hosts under "frukt.org":
> _mtx.frukt.org. IN A 127.0.0.1

Yup.  Or maybe participant._mtx.frukt.org.  Giving an A record to the _mtx
subdomain itself seems potentially problematic, although I'm not coming up
with a specific reason at the moment.  Any suggestions other than
"participant"?  That would probably be the most arbitrary part of the spec.

> If anyone connects from a host where reverse lookup or HELO puts it in
> "frukt.org" domain, you know that your should reject or score high unless
> it has FCDNS and a matching MTX record.

Yup.

> (And of course, if this catches on, you'll have to provide RFC style  
> documentation.)

Yup.


On 02/14, Jonas Eckerman wrote:
> On 2010-02-13 21:48, dar...@chaosreigns.com wrote:
>>On 02/13, mouss wrote:
>>   
>>> http://mipassoc.org/csv/draft-ietf-marid-csv-csa-02.txt  
>> Looks like it ties the helo domain to the delivering IP, breaking (broken)
>> forwarding just like SPF?
>
> Tying the HELO domain to an IP has does not break forwarding. The host  
> name (including domain) used in HELO is independent from the domain used  
> in MAIL FROM.

Yup, sorry.

It looks like Client SMTP Authorization doesn't require ownership of
the IP.  So a spammer could send spam from any IP on the internet, as
long as they use a HELO matching a domain they own and have created the
CSA records for.

> (It's not that use of SPF that breaks (borken) forwarding, it's the  
> limits connected to the domain used in MAIL FROM.)

Right.

-- 
"Forget not that the earth delights to feel your bare feet and the winds
long to play with your hair." - Kahlil Gibran
http://www.ChaosReigns.com


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-14 Thread --[ UxBoD ]--
- "Per Jessen"  wrote:

> Jonas Eckerman wrote:
> 
> > (And of course, if this catches on, you'll have to provide RFC
> style
> > documentation.)
> > 
> 
> See Justins posting from two days back:
> 
> http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/
> http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/draft-stumpf-dns-mtamark-04.txt
> 
> That proposal does not appear to have caught a lot of interest in
> 2004/2005, but perhaps it might now.
> 
> 
> /Per Jessen, Zürich

Personally I think it is a great idea and anything to help combat the spam is 
always a worthwhile effort.  Is it possible to resurrect that proposal and 
worth with the original authors and perhaps combine the efforts ?

Anybody who takes time to come up with ideas like this deserves the support of 
the community.

I am all for helping, where I can, to take this forward.

-- 
Thanks, Phil


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-14 Thread Per Jessen
Jonas Eckerman wrote:

> (And of course, if this catches on, you'll have to provide RFC style
> documentation.)
> 

See Justins posting from two days back:

http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/
http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/draft-stumpf-dns-mtamark-04.txt

That proposal does not appear to have caught a lot of interest in
2004/2005, but perhaps it might now.


/Per Jessen, Zürich



Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-14 Thread Jonas Eckerman

On 2010-02-13 21:48, dar...@chaosreigns.com wrote:


Looks like it ties the helo domain to the delivering IP, breaking (broken)
forwarding just like SPF?


Tying the HELO domain to an IP has does not break forwarding. The host 
name (including domain) used in HELO is independent from the domain used 
in MAIL FROM.


(It's not that use of SPF that breaks (borken) forwarding, it's the 
limits connected to the domain used in MAIL FROM.)


Regards
/Jonas
--
Jonas Eckerman
Fruktträdet & Förbundet Sveriges Dövblinda
http://www.fsdb.org/
http://www.frukt.org/
http://whatever.frukt.org/


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-14 Thread Jonas Eckerman

On 2010-02-13 04:24, dar...@chaosreigns.com wrote:


Still http://www.chaosreigns.com/mtx/


I still have the following comments (wich you didn't answer previously):

* I think there should be a way to tell the world wether you are using 
the scheme for a domain (not host) or not. This could easily be done in DNS.


* I think you should follow conventions in DNS naming, using an 
underscore to signify that the DNS record is a "special" type of record. 
This is quite common.



You could use SpamAssassins registrar boundaries stuff for getting the 
domain in a SA plugin, and score higher for missing MTX host record if 
there is an MTX domain record.



An example (of the top of my head) could be:

To say that "marmaduke.frukt.org" [195.67.112.219] is allowed to send mail:
219.112.67.195._mtx.marmaduke.frukt.org. IN A 127.0.0.1

To say that we're using your scheme for all hosts under "frukt.org":
_mtx.frukt.org. IN A 127.0.0.1

If anyone connects from a host where reverse lookup or HELO puts it in 
"frukt.org" domain, you know that your should reject or score high 
unless it has FCDNS and a matching MTX record.



(And of course, if this catches on, you'll have to provide RFC style 
documentation.)



Regards
/Jonas
--
Jonas Eckerman
Fruktträdet & Förbundet Sveriges Dövblinda
http://www.fsdb.org/
http://www.frukt.org/
http://whatever.frukt.org/


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-14 Thread Jonas Eckerman

On 2010-02-13 04:24, dar...@chaosreigns.com wrote:


panic.chaosreigns.com. IN SPF "v=spf1 a:64.71.152.40 -all"


No.  MTX defines 64.71.152.40 as a legitimate transmitting mail server,
regardless of the domain in the envelope from, From: header, etc..
Popular misconception, it seems.


The SPF record above says that a host using "panic.chaosreigns.com" in 
HELO should not be allowed to send mail unless it has the IP address 
64.71.152.40, regardless of the domain in the envelope from, From: 
header, etc..


That's not exactly the same as your MTX scheme, but it has similar 
results when combined with a FCDNS check on HELO (providing your scheme 
is universally adopted).


If you're serious about your proposal, you should explain (in your 
documentation) in what important way it differs from SPF as used against 
HELO and other similar schemes, and why it is better.


Regards
/Jonas
--
Jonas Eckerman
Fruktträdet & Förbundet Sveriges Dövblinda
http://www.fsdb.org/
http://www.frukt.org/
http://whatever.frukt.org/


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-13 Thread Darxus
On 02/13, mouss wrote:
> dar...@chaosreigns.com a écrit :
> did you take a look at CSA
>   
> http://mipassoc.org/csv/draft-ietf-marid-csv-csa-02.txt

I had not, thanks.

Looks like it ties the helo domain to the delivering IP, breaking (broken)
forwarding just like SPF?

> Anyway, such approaches are only helpful if widely adopted. otherwise,
> the overhead is not worth the pain.

I disagree.  But I think you have probably already read my reasons.

> At this time, just register your IP in DNSWL.

I have provided a server since 2007, and been an admin longer.  And wrote
some stuff.  I have assigned a minor penalty to emails not matching DNSWL
for years.  A significant part of my motivation for creating MTX is the
difficulty of maintaining that list.  MTX is very much inspired by DNSWL
- it's the same, except the domain that hosts the records (and omitting
the host "category" in the third octet).  SPF and DNSWL were the two
things in my head at the time that MTX occurred to me.  The bottom of
my MTX page credits them.  http://www.chaosreigns.com/mtx/background/
goes into detail.

-- 
"I'd rather be happy than right any day."
- Slartiblartfast, The Hitchhiker's Guide to the Galaxy
http://www.ChaosReigns.com


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-13 Thread mouss
dar...@chaosreigns.com a écrit :
> On 02/13, Matus UHLAR - fantomas wrote:
>> So the only effect of MTX should be confirmation that a machine may send
>> mail? 
> 
> Yes.
> 
>> So why the complicated check for DNS record combining DNS name and IP?
>> Why not simply requesting that machine has a "mail" or "smtp" in its DNS
>> name? 
> 
> I answered that recently.  
> 
> (I need to state that such a method would require a full circle DNS check.
> Not a problem)
> 
> 1) I am not comfortable requiring people to modify existing host names to
>participate.
> 

fully agreed. an IP is not necessarily dedicated to mail, so there is no
reason to force people to put "mail" in it.

and snow shoe spammers already use names "that people want"...

> 2) Probably more importantly, I am concerned about the possibility of
>spammers tricking DNS maintainers into giving them such host names.
> 
> These two problems are handled by
> http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/draft-stumpf-dns-mtamark-04.txt
> which was recently mentioned by Justin Mason.
> 
> 
> The advantage MTX has over mtamark, which I believe is important, is that
> MTX ties the spam to a domain name, which is tied to a registrar, which can
> be subpoenaed for the identity of the spammer.  mtamark leaves the spam
> still only tied to the transmitting IP, which I believe is less convenient
> to track.  Especially given IP hijacking via BGP.  Nasty.
> 

did you take a look at CSA

http://mipassoc.org/csv/draft-ietf-marid-csv-csa-02.txt

it uses an SRV record instead of the "so-much-abused reverse dns hack".


Anyway, such approaches are only helpful if widely adopted. otherwise,
the overhead is not worth the pain.

At this time, just register your IP in DNSWL.




Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-13 Thread Darxus
On 02/13, Matus UHLAR - fantomas wrote:
> So the only effect of MTX should be confirmation that a machine may send
> mail? 

Yes.

> So why the complicated check for DNS record combining DNS name and IP?
> Why not simply requesting that machine has a "mail" or "smtp" in its DNS
> name? 

I answered that recently.  

(I need to state that such a method would require a full circle DNS check.
Not a problem)

1) I am not comfortable requiring people to modify existing host names to
   participate.

2) Probably more importantly, I am concerned about the possibility of
   spammers tricking DNS maintainers into giving them such host names.

These two problems are handled by
http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/draft-stumpf-dns-mtamark-04.txt
which was recently mentioned by Justin Mason.


The advantage MTX has over mtamark, which I believe is important, is that
MTX ties the spam to a domain name, which is tied to a registrar, which can
be subpoenaed for the identity of the spammer.  mtamark leaves the spam
still only tied to the transmitting IP, which I believe is less convenient
to track.  Especially given IP hijacking via BGP.  Nasty.

-- 
"Of course there's strength in numbers. But there's strength in sharp
weaponry too. Ironically, this lead to what we call 'civilization'."
- spore
http://www.ChaosReigns.com


Re: MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-13 Thread Matus UHLAR - fantomas
> On 02/11, Matus UHLAR - fantomas wrote:
> > So you define the IP 64.71.152.40 as OK when sending mail from
> > @panic.chaosreigns.com. address.
> > 
> > so it's the exactly same as
> > 
> > panic.chaosreigns.com. IN SPF "v=spf1 a:64.71.152.40 -all"

On 12.02.10 22:24, dar...@chaosreigns.com wrote:
> No.  MTX defines 64.71.152.40 as a legitimate transmitting mail server,
> regardless of the domain in the envelope from, From: header, etc..
> Popular misconception, it seems.

So the only effect of MTX should be confirmation that a machine may send
mail? So why the complicated check for DNS record combining DNS name and IP?
Why not simply requesting that machine has a "mail" or "smtp" in its DNS
name? 
-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
I'm not interested in your website anymore.
If you need cookies, bake them yourself.


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-13 Thread Charles Gregory

On Sat, 13 Feb 2010, Per Jessen wrote:

Justin Mason wrote:

It might be useful to compare with MTA MARK and see what the status of
that proposal currently is:
http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/

Amazing.  Justin, you must have known about that one - you can't
possibly have just googled it?


Well, I certainly had never heard of this one. And I think that with one 
minor variation in concept it could be useful to scoring systems like 
SA...


Because of the threat of hacks, any system that 'favors' an MTA is simply 
giving spammers a target for exploitation. But an explicit 'disallow' 
record (MTA="0") created by the sysadmin would have a similar impact to 
deliberately naming PTR records as 'dynamic'. SA could 'detect' the 
explicit MTA="0" and add a score (or block outright at MTA level) The 
only thing I would *not* do, given the general laziness of the internet, 
is apply any default meaning to the absence of this TXT record. Only 
explicit identification of an IP or subnet as 'not permitted to send mail' 
would have significance to SA or a blocking MTA.


H. Could work. No impact for non-implementation. Disables an 
unauthorized IP for any case where it is used. I like it...


- C


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-13 Thread Per Jessen
Justin Mason wrote:

> On Thu, Feb 11, 2010 at 03:00,   wrote:
>> http://www.chaosreigns.com/mtx/
> 
> 
> It might be useful to compare with MTA MARK and see what the status of
> that proposal currently is:
> 
> http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/
>http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/draft-stumpf-dns-mtamark-04.txt

Amazing.  Justin, you must have known about that one - you can't
possibly have just googled it?


/Per Jessen, Zürich




MTX plugin functionally complete? Re: Spam filtering similar to SPF, less breakage

2010-02-12 Thread Darxus
* Implemented blacklisting.
* Clarified current recommendations and added content to the page.
* Removed redirect for Microsoft Internet Explorer users and converted
  the page to HTML 4.01 Strict.

Still http://www.chaosreigns.com/mtx/

I think the only thing left to do is to switch from send() to bgsend() for
speed.  Hopefully this weekend.

I would obviously appreciate testing. 

How much has SpamAssassin broken backward compatibility for plugins since
version 3.2.5?


On 02/11, Matus UHLAR - fantomas wrote:
> Imho, SPF does NOT break forwarding. It only causes the broken forwarding to
> be rejected. If I forward your mail to other address from my

No argument here.  I encourage you to fix it.  

> So you define the IP 64.71.152.40 as OK when sending mail from
> @panic.chaosreigns.com. address.
> 
> so it's the exactly same as
> 
> panic.chaosreigns.com. IN SPF "v=spf1 a:64.71.152.40 -all"

No.  MTX defines 64.71.152.40 as a legitimate transmitting mail server,
regardless of the domain in the envelope from, From: header, etc..
Popular misconception, it seems.

> > I'll define it slightly differently:
> > 127.0.0.1 is a pass (negative SA score).
> > not found is a fail (positive SA score).
> 
> what means "not found"?

$ host -t a fish.chaosreigns.com
Host fish.chaosreigns.com not found: 3(NXDOMAIN)
  ^
Undefined.

> "66.3.168.195.mtx.panic.chaosreigns.com not found" would mean I'm not
> allowed to mail from "panic.chaosreigns.com" address?

It would mean mail from that IP should get penalized.

> Or will my server be allowed to mail from your domain? Because SPF above

Yes.

> defines this mail to be rejected and nonexistance of the mtx record would do
> the same, even it it's your forwarded e-mail.

No, as I clarified earlier.

> So, since you don't believe SPF to be widely adopted, you expect your way to
> be adopted? And all admins must adopt that? Even if they did not adopt
> SPF/DKIM for a few years they exist?

No, I would say SPF has been pretty widely adopted.

But I believe SPF has not been *more* widely adopted due to the
forwarding problem.  So I created an alternative to eliminate that
problem.  So yes, I think it might get more widely adopted.  Of course
I can't expect anything.

DKIM also has problems which MTX doesn't have.  I mentioned the ones
I'm aware of in the recently added Comparisons section of the MTX page.
(Replay, content modification, CPU overhead, complexity.)

> the correct question is "hwo is this better?". Creating not better system is
> useless.

Have I answered this sufficiently?

> > .mtx.
> > 
> > (And the IP needs to be reversed as in all other A records that list IPs.)
> 
> that's what I call complicated. SPF designs the same by using much easier
> way, using existing A/MX/PTR records, CIDR ranges, including other SPF
> records...

I find it bizarre that you can think MTX is more complicated than SPF.  


On 02/12, Matus UHLAR - fantomas wrote:
> On 11.02.10 16:34, dar...@chaosreigns.com wrote:
> > I am not suggesting that anyone block anything based on MTX at this time.
> 
> you have been doing that, afaics.

Communication failure on my part, I apologize.  I hope I have made the web
page clearer.

My hope is that long term, all mail will be blocked when there is no
MTX record.  That would obviously be foolish in the short term.

I *am* currently causing a very small number of false positives by
increasing SpamAssassin score by 2 for any email without an MTX record.  As
you can imagine, this blocks more spam.  Also, the senders of those false
positives get notified without sending backscatter.  This configuration is
currently listed under "Aggressive Testing" on my site.

> Read my last mail in this thread where I've asked you how exactly you
> imagine the MTX not to "break" forwarding.

I'm sorry I missed it earlier.  I stopped looking for subjects with "SPF"
after I posted one with "MTX".  I thought that thread died.  Thank you for
mentioning it.

-- 
"For every battle there is a price to pay. Now pick up your teeth and
go home." - no fear
http://www.ChaosReigns.com


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-12 Thread Justin Mason
On Thu, Feb 11, 2010 at 03:00,   wrote:
> http://www.chaosreigns.com/mtx/


It might be useful to compare with MTA MARK and see what the status of
that proposal currently is:

http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/
http://tools.ietf.org/draft/draft-stumpf-dns-mtamark/draft-stumpf-dns-mtamark-04.txt

-- 
--j.


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-12 Thread Matus UHLAR - fantomas
> On 02/11, Henrik K wrote:
> > method of whitelisting. You can't seriously expect to block on some
> > attribute that not everyone can or bothers to change (DNS). None of this

On 11.02.10 16:34, dar...@chaosreigns.com wrote:
> I am not suggesting that anyone block anything based on MTX at this time.

you have been doing that, afaics.

> I suggest using it for whitelisting (small negative score, not absolute
> whitelisting) alone until it is more broadly in use.

You suggested rejecting everything that fails MTX check
(everything that does not have the D.C.B.A.mtx. record).

> Except for those who are willing to cause a small number of false
> positives, like me.

Most of them have implemented SPF checking long ago.

> It's funny how, for just believing I may have come up with an idea that is
> new and useful for dealing with spam, I am consistently attacked.  Because
> people often believe that, and they're almost always wrong.  I can't
> blame you, purely statistically speaking, I'm probably wrong.  And I
> assure you that fact has not slipped my mind.

We are not attacking you, but your proposal. You are telling nice things
about it but you have not explained how they would be impemented.

Read my last mail in this thread where I've asked you how exactly you
imagine the MTX not to "break" forwarding.
-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Fucking windows! Bring Bill Gates! (Southpark the movie)


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Ted Mittelstaedt

Bowie Bailey wrote:

LuKreme wrote:

On 11-Feb-2010, at 11:11, Charles Gregory wrote:
  

It's a rant page telling the visitor that you cannot read the site using 
Internet Explorer,


Good. Get a real browser.

  

 with major (large font) attitude that this is the fault of the browser.


It is, and this is explained clearly. IE does not support (I believe has never 
supported and still does not support) Content-Type: application/xhtml+xml, and 
does not, has not, and will probably never suport SVG images (though there were 
no images on the original page).

Who would you like to blame for this if not Microsoft IE?
  


I would blame whoever set up the website.  The page in question does not
even attempt to use the features that the "fail" page refers to.  IE may
not be able to handle "xhtml+xml" or SVG images, but as long as it can
render the page in question, who cares?  That redirect should be limited
to pages that actually use the features in question.



The redirect states "...9 year old standard required by the web
page..."  so you obviously are blind, because the website developer
couldn't possibly be lying.  ;-)

I would refer the redirect author to the section

"The Myth of "HTML-compatible XHTML 1.0 documents"

in the following document  http://hixie.ch/advocacy/xhtml

for an adult's understanding of why IE does not support it.

The solution is HTML5 support in IE, and once the HTML5 people
are finished wrangling amongst themselves, IE will support it.
That is why Microsoft joined the SVG working group of w3c last
month - because now with Adobe pulling their support of their
SVG IE plugin last year, it looks like we finally might have
some movement in that B.M. called HTML5.

The fact is the 4.01 standard is over a decade old.  If the
HTML5 people had agreed on a set of standards 5 years ago
then we would have support for SVG and XHTML it in IE today.

The second fact is that if MS HAD supported SVG and XHTML then
the W3C would have come under tremendous pressure to force out
that HTML5 standard.  I don't think they would have liked that
any better.

Ted




Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Charles Gregory

On Thu, 11 Feb 2010, Bowie Bailey wrote:
I would blame whoever set up the website.  The page in question does not 
even attempt to use the features that the "fail" page refers to.


(nod) I guess that really says it all
Thanks for mentioning this. Now my 'vague feeling' is confirmed.

-  C


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Darxus
On 02/11, Henrik K wrote:
> method of whitelisting. You can't seriously expect to block on some
> attribute that not everyone can or bothers to change (DNS). None of this

Correct.

I am not suggesting that anyone block anything based on MTX at this time.
I suggest using it for whitelisting (small negative score, not absolute
whitelisting) alone until it is more broadly in use.

This is clearly stated in the Implementation Sequence:

Conservative people use these new tests to reduce false positives:

  score MTX_BL 1
  score MTX_PASS -1 # Only hit if MTX_BL wasn't. 
  score MTX_FAIL 0.001


Except for those who are willing to cause a small number of false
positives, like me.  I can, and do, score more harshly those emails that
do not have MTX records.  And the senders get an error mentioning the
option of MTX.  All the emails that have been hit seemed likely to be spam.
For example, this list gets through just fine with these settings:

  score MTX_PASS -100
  score MTX_FAIL 2


As to the problem of freemail, sites that send both non-spam and spam,
constantly, I think that necessitates a blacklist that allows you to
define a score per domain (of the PTR record of the sending IP).  So, for
example, you could blacklist hotmail to only negate the benefit of them
having an MTX record, so for hotmail, the net result would be 0.  


It's funny how, for just believing I may have come up with an idea that is
new and useful for dealing with spam, I am consistently attacked.  Because
people often believe that, and they're almost always wrong.  I can't
blame you, purely statistically speaking, I'm probably wrong.  And I
assure you that fact has not slipped my mind.

-- 
"Let's just say that if complete and utter chaos was lightning, then
he'd be the sort to stand on a hilltop in a thunderstorm wearing wet
copper armour and shouting 'All gods are bastards'." - The Color of Magic
http://www.ChaosReigns.com


Re: [sa] Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Charles Gregory

On Thu, 11 Feb 2010, LuKreme wrote:
It's a rant page telling the visitor that you cannot read the site 
using Internet Explorer,

Good. Get a real browser.


Like I said, he (and you) can rant all you want about the evils of 
Microsoft, and frankly I wouldn't be inclined to argue with you. (grin)


But the moment someone posts a link that purports to lead to *content* and 
replaces that content with (essentially) a political *rant*, and does so 
only on the basis of that same policitcal BS, then they are no better than 
the spammer who uses his latest clever trick to get political spam into my 
mailbox. Quiet ironic for a discussion on an anti-spam list. :)


- C



Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Charles Gregory

On Thu, 11 Feb 2010, LuKreme wrote:

Erm.. The string "microsoft" doesn't even exist on that page.


"No Microsoft browser supports this 9 year old standard."

Obviously you are't using IE and so you weren't subjected to the
arrogant refusal of his server to deliver the requested page.

(shrug)

- C


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Bowie Bailey
LuKreme wrote:
> On 11-Feb-2010, at 11:11, Charles Gregory wrote:
>   
>> It's a rant page telling the visitor that you cannot read the site using 
>> Internet Explorer,
>> 
>
> Good. Get a real browser.
>
>   
>>  with major (large font) attitude that this is the fault of the browser.
>> 
>
> It is, and this is explained clearly. IE does not support (I believe has 
> never supported and still does not support) Content-Type: 
> application/xhtml+xml, and does not, has not, and will probably never suport 
> SVG images (though there were no images on the original page).
>
> Who would you like to blame for this if not Microsoft IE?
>   

I would blame whoever set up the website.  The page in question does not
even attempt to use the features that the "fail" page refers to.  IE may
not be able to handle "xhtml+xml" or SVG images, but as long as it can
render the page in question, who cares?  That redirect should be limited
to pages that actually use the features in question.

-- 
Bowie


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread LuKreme
On 11-Feb-2010, at 11:11, Charles Gregory wrote:
> 
> It's a rant page telling the visitor that you cannot read the site using 
> Internet Explorer,

Good. Get a real browser.

>  with major (large font) attitude that this is the fault of the browser.

It is, and this is explained clearly. IE does not support (I believe has never 
supported and still does not support) Content-Type: application/xhtml+xml, and 
does not, has not, and will probably never suport SVG images (though there were 
no images on the original page).

Who would you like to blame for this if not Microsoft IE?


-- 
I WILL NOT FAKE MY WAY THROUGH LIFE
Bart chalkboard Ep. 7F03



Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread LuKreme
On 11-Feb-2010, at 09:55, Charles Gregory wrote:
> 
> You are welcome to your opinions on browsers, and are free to whine about the 
> evils of microsoft all you want, but if you are going to post a link
> with the intent for the 'average' person to read it, then you better make it 
> *accessible* to that average person.

Erm.. The string "microsoft" doesn't even exist on that page.



-- 
'Have you lost your senses?'
'Yes, but I may have found some better ones.' --Interesting Times



Re: Spam filtering similar to SPF, less breakage

2010-02-11 Thread Per Jessen
Matus UHLAR - fantomas wrote:

>> Matus UHLAR - fantomas wrote:
>> > Imho, SPF does NOT break forwarding.
> 
> On 11.02.10 19:37, Per Jessen wrote:
>> Hmm, the SRS people seem to disagree:
>> 
>> http://www.openspf.org/SRS :  SPF "breaks" email forwarding.
> 
> I think those quotes say it all. SRS is a way to create correct and
> trackable forwarding, SPF or not.

Well, I'll just note that SRS was invented exclusively because of SPF,
not because of any critical/actual problems in email forwarding.  
What is hindering SPF adoption is also a distinct lack of development on
the SRS front, notably in getting a workable/performant setup for a
major mailserver such as postfix.  

> The forwarding without changing sender is imho already broken, 
> however the breakage gets visible with SPF adoption.
> 

Just my opinion, but I would tend to think that SPF broke it then. 


/Per Jessen, Zürich



Re: Spam filtering similar to SPF, less breakage

2010-02-11 Thread Mike Cardwell
On 11/02/2010 18:52, Matus UHLAR - fantomas wrote:

>>> Imho, SPF does NOT break forwarding. 
> 
> On 11.02.10 19:37, Per Jessen wrote:
>> Hmm, the SRS people seem to disagree:
>>
>> http://www.openspf.org/SRS :  SPF "breaks" email forwarding.
> 
> I think those quotes say it all. SRS is a way to create correct and
> trackable forwarding, SPF or not.
> 
> The forwardind without changing sender is imho already broken, however the
> breakage gets visible with SPF adoption.

Yes. A more accurate statement than, "SPF breaks forwarding," would be,
"Broken forwarding is incompatible with SPF."

-- 
Mike Cardwell: UK based IT Consultant, Perl developer, Linux admin
Cardwell IT Ltd. : UK Company - http://cardwellit.com/   #06920226
Technical Blog   : Tech Blog  - https://secure.grepular.com/
Spamalyser   : Spam Tool  - http://spamalyser.com/


Re: Spam filtering similar to SPF, less breakage

2010-02-11 Thread Matus UHLAR - fantomas
> Matus UHLAR - fantomas wrote:
> > Imho, SPF does NOT break forwarding. 

On 11.02.10 19:37, Per Jessen wrote:
> Hmm, the SRS people seem to disagree:
> 
> http://www.openspf.org/SRS :  SPF "breaks" email forwarding.

I think those quotes say it all. SRS is a way to create correct and
trackable forwarding, SPF or not.

The forwardind without changing sender is imho already broken, however the
breakage gets visible with SPF adoption.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Spam is for losers who can't get business any other way.


Re: Spam filtering similar to SPF, less breakage

2010-02-11 Thread Per Jessen
Matus UHLAR - fantomas wrote:

> On 09.02.10 11:42, dar...@chaosreigns.com wrote:
>> I apparently need to clarify that I think this is a good idea because
>> I am concerned about the number of people (who control DNS records)
>> who are very strongly against creating SPF records specifically
>> because of forwarding
>> breakage.  The email I got in response to my request for my employer
>> to
>> create an SPF record included the word "abomination".  From a friend.
>> I don't entirely agree, but it is a problem for adoption.
>> 
>> This is entirely an attempt to replicate the functionality of SPF
>> without breaking forwarding, and without causing other problems that
>> might discourage adoption.
> 
> Imho, SPF does NOT break forwarding. 

Hmm, the SRS people seem to disagree:

http://www.openspf.org/SRS :  SPF "breaks" email forwarding.


/Per Jessen, Zürich



Re: [sa] Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Charles Gregory

On Thu, 11 Feb 2010, Bowie Bailey wrote:

What page were you looking at?  All I see at that URL is a fairly
straightforward description of how to implement his MTX system.


The page 'redirects' to this one: http://www.chaosreigns.com/fail

It's a rant page telling the visitor that you cannot read the site using 
Internet Explorer, with major (large font) attitude that this is the fault 
of the browser.


- C


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Henrik K
On Thu, Feb 11, 2010 at 06:42:44PM +0100, Matus UHLAR - fantomas wrote:
> > > > On Wed, Feb 10, 2010 at 10:00:05PM -0500, dar...@chaosreigns.com wrote:
> > > > > http://www.chaosreigns.com/mtx/
> 
> > > On 11.02.10 16:06, Henrik K wrote:
> > > > What a complex scheme you invented for a simple problem. All you have 
> > > > to do
> > > > is to require legimate relays to have a FCrDNS entry with an actually
> > > > identifiable name, like starting with "smtp". Much simpler to take 
> > > > advantage
> > > > of that and it actually is somewhat used today.
> 
> > On Thu, Feb 11, 2010 at 06:25:07PM +0100, Matus UHLAR - fantomas wrote:
> > > ok, I should do an s/^ip-/smtp-/ on all our clients' ips...
> 
> On 11.02.10 19:34, Henrik K wrote:
> > I don't know if there's some joke included or whatever. If they are sending
> > mail, then yes having a good PTR will result in less greylisting etc.
> 
> of course
> ip-212-081-019-000.static.nextra.sk.
> 
> well, dynamic addresses are listed differently:
> 
> dial-195-168-160-000.dynamic.nextra.sk.
> adsl-195-168-244-000.dynamic.nextra.sk.
> 
> so probably 
> s/^(dial|adsl|ip)-/smtp-/
> 
> there are _many_ mailservers not having name indicating they are used for
> mail and I don't think any form of requiring them to have such name is a
> good idea...

If the "owner" of such IP wants, he will order the change (if possible). No
one is _requiring_ them to have any name, but what name do you think will
pass the most mail?

If you are the ISP, it's not your job to start changing anything without
notice.



Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Matus UHLAR - fantomas
> > > On Wed, Feb 10, 2010 at 10:00:05PM -0500, dar...@chaosreigns.com wrote:
> > > > http://www.chaosreigns.com/mtx/

> > On 11.02.10 16:06, Henrik K wrote:
> > > What a complex scheme you invented for a simple problem. All you have to 
> > > do
> > > is to require legimate relays to have a FCrDNS entry with an actually
> > > identifiable name, like starting with "smtp". Much simpler to take 
> > > advantage
> > > of that and it actually is somewhat used today.

> On Thu, Feb 11, 2010 at 06:25:07PM +0100, Matus UHLAR - fantomas wrote:
> > ok, I should do an s/^ip-/smtp-/ on all our clients' ips...

On 11.02.10 19:34, Henrik K wrote:
> I don't know if there's some joke included or whatever. If they are sending
> mail, then yes having a good PTR will result in less greylisting etc.

of course
ip-212-081-019-000.static.nextra.sk.

well, dynamic addresses are listed differently:

dial-195-168-160-000.dynamic.nextra.sk.
adsl-195-168-244-000.dynamic.nextra.sk.

so probably 
s/^(dial|adsl|ip)-/smtp-/

there are _many_ mailservers not having name indicating they are used for
mail and I don't think any form of requiring them to have such name is a
good idea...

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Support bacteria - they're the only culture some people have. 


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Henrik K
On Thu, Feb 11, 2010 at 06:25:07PM +0100, Matus UHLAR - fantomas wrote:
> > On Wed, Feb 10, 2010 at 10:00:05PM -0500, dar...@chaosreigns.com wrote:
> > > http://www.chaosreigns.com/mtx/
> 
> On 11.02.10 16:06, Henrik K wrote:
> > What a complex scheme you invented for a simple problem. All you have to do
> > is to require legimate relays to have a FCrDNS entry with an actually
> > identifiable name, like starting with "smtp". Much simpler to take advantage
> > of that and it actually is somewhat used today.
> 
> ok, I should do an s/^ip-/smtp-/ on all our clients' ips...

I don't know if there's some joke included or whatever. If they are sending
mail, then yes having a good PTR will result in less greylisting etc.



Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Matus UHLAR - fantomas
> On Wed, Feb 10, 2010 at 10:00:05PM -0500, dar...@chaosreigns.com wrote:
> > http://www.chaosreigns.com/mtx/

On 11.02.10 16:06, Henrik K wrote:
> What a complex scheme you invented for a simple problem. All you have to do
> is to require legimate relays to have a FCrDNS entry with an actually
> identifiable name, like starting with "smtp". Much simpler to take advantage
> of that and it actually is somewhat used today.

ok, I should do an s/^ip-/smtp-/ on all our clients' ips...

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Quantum mechanics: The dreams stuff is made of. 


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Jeff Mincy
   From: Charles Gregory 
   Date: Thu, 11 Feb 2010 11:55:10 -0500 (EST)
   
   On Wed, 10 Feb 2010, dar...@chaosreigns.com wrote:
   > http://www.chaosreigns.com/mtx/
   
   You know, just for a moment I thought I would take a look, just for 
   curiosity sake, and instead got this moronic jack-ass ATTITUDE page.

Heh.  Using IE 7.0 I get:

  Your browser cannot handle the 9 year old standard required by the
  web page you attempted to access. ...

IE 7.0 displays the page fine, but you have to save the file out as a
plain html file.

-jeff


Re: Spam filtering similar to SPF, less breakage

2010-02-11 Thread Matus UHLAR - fantomas
On 09.02.10 11:42, dar...@chaosreigns.com wrote:
> I apparently need to clarify that I think this is a good idea because I am
> concerned about the number of people (who control DNS records) who are very
> strongly against creating SPF records specifically because of forwarding
> breakage.  The email I got in response to my request for my employer to
> create an SPF record included the word "abomination".  From a friend.
> I don't entirely agree, but it is a problem for adoption.
> 
> This is entirely an attempt to replicate the functionality of SPF without
> breaking forwarding, and without causing other problems that might
> discourage adoption.

Imho, SPF does NOT break forwarding. It only causes the broken forwarding to
be rejected. If I forward your mail to other address from my
aliases/virtuser/.forward/.procmailrc/whatever file, It is already not you
who sent the mail (although the mail is from you and POSSIBLY not modified).

Thus, I should rewrite the from address to indicate the mail is from me
(nobody really needs to trust me the mail is from you, unless it's
DKIM/PGP/SMIME signed).

> I set this up for my mail server (using mtx instead of designatedsender):
> 
> $ host -t PTR 64.71.152.40
> 40.152.71.64.in-addr.arpa domain name pointer panic.chaosreigns.com.
> 
> $ host -t A 40.152.71.64.mtx.panic.chaosreigns.com
> 40.152.71.64.mtx.panic.chaosreigns.com has address 127.0.0.1

So you define the IP 64.71.152.40 as OK when sending mail from
@panic.chaosreigns.com. address.

so it's the exactly same as

panic.chaosreigns.com. IN SPF "v=spf1 a:64.71.152.40 -all"

> I'll define it slightly differently:
> 127.0.0.1 is a pass (negative SA score).
> not found is a fail (positive SA score).

what means "not found"?

"66.3.168.195.mtx.panic.chaosreigns.com not found" would mean I'm not
allowed to mail from "panic.chaosreigns.com" address?

Or will my server be allowed to mail from your domain? Because SPF above
defines this mail to be rejected and nonexistance of the mtx record would do
the same, even it it's your forwarded e-mail.

> 127.0.0.0 is a fail (positive SA score).
> Anything else is undefined (0 SA score) for future options.

> I'd still appreciate feedback on the format of the A record.

...

> >> Is there any way this wouldn't be very useful?
> >
> > Is there any place where SPF does not do the same job, other than mail  
> > forwarding?
> 
> No.  But as I said, I am concerned about the potential for wide spread
> adoption of SPF due to forwarding breakage enough that I think this would
> be much more useful.

So, since you don't believe SPF to be widely adopted, you expect your way to
be adopted? And all admins must adopt that? Even if they did not adopt
SPF/DKIM for a few years they exist?

> > On 08.02.10 22:08, dar...@chaosreigns.com wrote:
> > > So it's not tied to the SMTP MAIL FROM or anything.
> > > Forwarding doesn't break.

> On 02/09, Matus UHLAR - fantomas wrote:
> > What do you mean by this?
> > Do you want to implement new way of defining which hosts are permitted to
> > send e-mail? 
> 
> Yes.

> > There already are attempts to do this, with false positives and
> > negatives. 
> 
> How is this not better than the other attempts?

the correct question is "hwo is this better?". Creating not better system is
useless.

> > Yours is a bit complicated
> 
> How is it complicated?  You need to create 1 record per sending mail
> server, in the form:
> 
> .mtx.
> 
> (And the IP needs to be reversed as in all other A records that list IPs.)


that's what I call complicated. SPF designs the same by using much easier
way, using existing A/MX/PTR records, CIDR ranges, including other SPF
records...

> > and new which means everyone would
> > need to implement this (otherwise he'd get false positives on his outgoing
> > mail). 
> 
> Yes.

http://www.rhyolite.com/anti-spam/you-might-be.html#programmer
http://www.rhyolite.com/anti-spam/you-might-be.html#senior-IETF-member-5

which one applies to you? :)

> > Therefore I think it won't work this way.
> 
> This is why I said SA scores for a fail should be small at first.  
> 
> 
> Do you see any reason this wouldn't be more quickly adopted than SPF?

yes, I think this ain't any better than SPF.


-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
I intend to live forever - so far so good. 


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Henrik K
On Thu, Feb 11, 2010 at 11:57:47AM -0500, Bowie Bailey wrote:
> dar...@chaosreigns.com wrote:
> > On 02/11, Henrik K wrote:
> >   
> >> What a complex scheme you invented for a simple problem. All you have to do
> >> is to require legimate relays to have a FCrDNS entry with an actually
> >> identifiable name, like starting with "smtp". Much simpler to take 
> >> advantage
> >> of that and it actually is somewhat used today.
> >> 
> >
> > I did consider this, but I didn't think it was reasonable to expect people
> > to change the host names of their transmitting mail servers.  MTX has
> > the advantage of only listing mail servers that transmit legitimately, not
> > including servers that only receive, although it might be a distinction
> > worth losing in exchange for increased adoption.
> >   
> 
> And you do think it is reasonable to expect people to create an entirely
> new DNS subtree?
> 
> Personally, I would rather change the server name.

Yeah and lets not forget that what we are looking at is just "another"
method of whitelisting. You can't seriously expect to block on some
attribute that not everyone can or bothers to change (DNS). None of this
allows skipping scanning completely anyway (freemails etc? hello?). So it's
pointless given that there are already bunch of methods that are easier. Not
to mention the proposed "blacklisting" that can and has been done without
"MTX".



Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Bowie Bailey
Charles Gregory wrote:
> On Wed, 10 Feb 2010, dar...@chaosreigns.com wrote:
>> http://www.chaosreigns.com/mtx/
>
> You know, just for a moment I thought I would take a look, just for
> curiosity sake, and instead got this moronic jack-ass ATTITUDE page.

What page were you looking at?  All I see at that URL is a fairly
straightforward description of how to implement his MTX system.

> You are welcome to your opinions on browsers, and are free to whine
> about the evils of microsoft all you want, but if you are going to
> post a link
> with the intent for the 'average' person to read it, then you better
> make it *accessible* to that average person.

The page renders fine for me on Linux/Firefox...

-- 
Bowie


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Charles Gregory

On Wed, 10 Feb 2010, dar...@chaosreigns.com wrote:

http://www.chaosreigns.com/mtx/


You know, just for a moment I thought I would take a look, just for 
curiosity sake, and instead got this moronic jack-ass ATTITUDE page.


You are welcome to your opinions on browsers, and are free to whine about 
the evils of microsoft all you want, but if you are going to post a link
with the intent for the 'average' person to read it, then you better 
make it *accessible* to that average person.


Otherwise, you are just being arrogant and rude, and deserve nothing more 
than a hearty F__K YOU and blacklisting for wasting everyone's time.


Don't bother replying to this post, you are officialy dev/nulled (I would 
delight in bouncing your sorry opinions back to you, but they wouldn't go 
back to you, they would go back to the list).


- C


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Bowie Bailey
dar...@chaosreigns.com wrote:
> On 02/11, Henrik K wrote:
>   
>> What a complex scheme you invented for a simple problem. All you have to do
>> is to require legimate relays to have a FCrDNS entry with an actually
>> identifiable name, like starting with "smtp". Much simpler to take advantage
>> of that and it actually is somewhat used today.
>> 
>
> I did consider this, but I didn't think it was reasonable to expect people
> to change the host names of their transmitting mail servers.  MTX has
> the advantage of only listing mail servers that transmit legitimately, not
> including servers that only receive, although it might be a distinction
> worth losing in exchange for increased adoption.
>   

And you do think it is reasonable to expect people to create an entirely
new DNS subtree?

Personally, I would rather change the server name.

> I encourage you to get your method standardized.  It might work better.
> In the mean time, I think mine has a better chance of adoption because
> there is no reason not to create the records.
>
> Perhaps I should consider ".smtp." in a hostname a "pass" for MTX?
> I'd prefer not to use that particular string since it's associated with
> receiving servers more than transmitting.  I'd be tempted to do ".mtx.",
> except I'm concerned about administrators unaware of it allowing spammers
> to have hostnames including it.  Same for ".smtp.", actually.  I like
> the separate MTX record because it's very explicit identification of a
> legitimate transmitting mail server.
>   

"mail" and "mta" are also fairly common.  And don't forget things like
"smtp01", "smtp02", etc.

-- 
Bowie


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Darxus
On 02/11, Henrik K wrote:
> What a complex scheme you invented for a simple problem. All you have to do
> is to require legimate relays to have a FCrDNS entry with an actually
> identifiable name, like starting with "smtp". Much simpler to take advantage
> of that and it actually is somewhat used today.

I did consider this, but I didn't think it was reasonable to expect people
to change the host names of their transmitting mail servers.  MTX has
the advantage of only listing mail servers that transmit legitimately, not
including servers that only receive, although it might be a distinction
worth losing in exchange for increased adoption.

I encourage you to get your method standardized.  It might work better.
In the mean time, I think mine has a better chance of adoption because
there is no reason not to create the records.

Perhaps I should consider ".smtp." in a hostname a "pass" for MTX?
I'd prefer not to use that particular string since it's associated with
receiving servers more than transmitting.  I'd be tempted to do ".mtx.",
except I'm concerned about administrators unaware of it allowing spammers
to have hostnames including it.  Same for ".smtp.", actually.  I like
the separate MTX record because it's very explicit identification of a
legitimate transmitting mail server.

-- 
"When in doubt, gas it. It may not solve the problem,
But it ends the suspense." - Steve Moonitz, DoD #2319, 1994
http://www.ChaosReigns.com


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Henrik K
On Thu, Feb 11, 2010 at 03:45:32PM +0100, Per Jessen wrote:
> Henrik K wrote:
> 
> > On Wed, Feb 10, 2010 at 10:00:05PM -0500, dar...@chaosreigns.com
> > wrote:
> >> http://www.chaosreigns.com/mtx/
> > 
> > What a complex scheme you invented for a simple problem. All you have
> > to do is to require legimate relays to have a FCrDNS entry with an
> > actually identifiable name, like starting with "smtp". Much simpler to
> > take advantage of that and it actually is somewhat used today.
> 
> Hmm, yeah - 
> 
> Draxus' proposal:  publish a DNS record identifying an IP-address as one
> of your mail-servers. 
> 
> Henrik:  name your mail-server such that is identifiable as a
> mailserver. 

And yeah, I know: my method requires you to dedicate the possibly only PTR
you have to some use (since multiple are discouraged and broken). But it's
already a known good manner. The MTX proposal adds pretty much no value and
has zero chance for widespread adoption.



Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Per Jessen
Henrik K wrote:

> On Wed, Feb 10, 2010 at 10:00:05PM -0500, dar...@chaosreigns.com
> wrote:
>> http://www.chaosreigns.com/mtx/
> 
> What a complex scheme you invented for a simple problem. All you have
> to do is to require legimate relays to have a FCrDNS entry with an
> actually identifiable name, like starting with "smtp". Much simpler to
> take advantage of that and it actually is somewhat used today.

Hmm, yeah - 

Draxus' proposal:  publish a DNS record identifying an IP-address as one
of your mail-servers. 

Henrik:  name your mail-server such that is identifiable as a
mailserver. 


/Per Jessen, Zürich



Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Henrik K
On Wed, Feb 10, 2010 at 10:00:05PM -0500, dar...@chaosreigns.com wrote:
> http://www.chaosreigns.com/mtx/

What a complex scheme you invented for a simple problem. All you have to do
is to require legimate relays to have a FCrDNS entry with an actually
identifiable name, like starting with "smtp". Much simpler to take advantage
of that and it actually is somewhat used today.



Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread Darxus
On 02/11, --[ UxBoD ]-- wrote:
> Like the simplicity and it does appear to be a great idea.  Why do you 
> believe SPF or DKIM generate breakage ?

Thank you.

SPF breakage occurs where a user has configured one of their email
addresses to automatically forward their mail to another of their email
addresses, and this is (commonly) handled without rewriting the "envelope
from".  So it fails SPF checking because the forwarding server's IP does
not match the "envelope from" domain's SPF record.  Also, enough people
seem to be offended by the solution to this problem of rewriting the
envelope from that it is a significant barrier to adoption.  

At the moment I do not believe DKIM style solutions cause breakage.
Honestly I have not looked into them enough.  But as you said:  Simplicity.

At a brief glance, MTX does not have the problems listed here:
http://en.wikipedia.org/wiki/DomainKeys_Identified_Mail#Weaknesses
(message replay, arbitrary forwarding, breakage by (mailing list)
modification of email, CPU overhead)

-- 
"When we remember we are all mad, the mysteries of life disappear and
life stands explained." - Mark Twain
http://www.ChaosReigns.com


Re: MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-11 Thread --[ UxBoD ]--
- dar...@chaosreigns.com wrote:

> http://www.chaosreigns.com/mtx/
> 
> -- 
> "Democracy is the theory that the common people know what they want,
> and deserve to get it good and hard." - H. L. Mencken
> http://www.ChaosReigns.com

Like the simplicity and it does appear to be a great idea.  Why do you believe 
SPF or DKIM generate breakage ?
-- 
Thanks, Phil


MTX plugin created (Re: Spam filtering similar to SPF, less breakage)

2010-02-10 Thread Darxus
http://www.chaosreigns.com/mtx/

-- 
"Democracy is the theory that the common people know what they want,
and deserve to get it good and hard." - H. L. Mencken
http://www.ChaosReigns.com


Re: Spam filtering similar to SPF, less breakage

2010-02-10 Thread Jonas Eckerman

On 2010-02-09 22:31, dar...@chaosreigns.com wrote:
[Ideas for a new scheme similar to a subset of SPF.]

I don't think the SpamAssassin users list is the right place to discuss 
a new generasl scheme like this, but here goes anyway.


Please not that the comments below is just a first reaction. I haven't 
really thought this through.


A general thought is:
What does your current scheme give that HELO SPF + FCDNS doesn't?
(SPF can be used with HELO as well as MAIL FROM).


What format should this arbitrary A record be?


I suggest you use a leading underscore for you magic subdomain 
(2.0.0.10._mtx.smallbusiness.com).


I do this because I think your scheme need one more thing to be of any 
use at all. It needs a way for the domain owner to sopecify that they 
are using it. This could be done by creating a record for 
"_mtx.smallbusiness.com".


Without a way to indicate wether the scheme is used or not, it'll be 
unusable for blocking until *all* major email providers as well as 
almost everyone else is using it.


Using an underscore makes it less likely to collide with existing host 
names. It also makes it more apparent that it's not a regular hostname.


A new record type might be even better.

Regards
/Jonas
--
Jonas Eckerman
Fruktträdet & Förbundet Sveriges Dövblinda
http://www.fsdb.org/
http://www.frukt.org/
http://whatever.frukt.org/


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread ram

On Tue, 2010-02-09 at 11:42 -0500, dar...@chaosreigns.com wrote:
> I apparently need to clarify that I think this is a good idea because I am
> concerned about the number of people (who control DNS records) who are very
> strongly against creating SPF records specifically because of forwarding
> breakage.  The email I got in response to my request for my employer to
> create an SPF record included the word "abomination".  From a friend.
> I don't entirely agree, but it is a problem for adoption.
> 
> This is entirely an attempt to replicate the functionality of SPF without
> breaking forwarding, and without causing other problems that might
> discourage adoption.
> 
> 
How does this idea authenticate mail from domain ? SPF is aimed at doing
that. 

IMHO the SPF-breaks-forwarding argument is misplaced
What about SRS. If SRS implementation is not going to be easy because
mailservers have been there too long for adopting anything new then can
your be sure MailServer IP validation will be adopted  ? 

Anyway I block spams from almost all non-mailservers by using RBL's 
I dont see any value add in implementing this 


Thanks
Ram



> I set this up for my mail server (using mtx instead of designatedsender):
> 
> $ host -t PTR 64.71.152.40
> 40.152.71.64.in-addr.arpa domain name pointer panic.chaosreigns.com.
> 
> $ host -t A 40.152.71.64.mtx.panic.chaosreigns.com
> 40.152.71.64.mtx.panic.chaosreigns.com has address 127.0.0.1
> 
> All it took was creating a single record in bind:
> 
> 40.152.71.64.mtx.panic.chaosreigns.com. IN A 127.0.0.1
> 
> 
> I'll define it slightly differently:
> 127.0.0.1 is a pass (negative SA score).
> not found is a fail (positive SA score).
> 127.0.0.0 is a fail (positive SA score).
> Anything else is undefined (0 SA score) for future options.
> 
> 
> I'd still appreciate feedback on the format of the A record.
> 
> 
> On 02/09, RW wrote:
> > You've mixed-up A record and PTR record. 
> 
> Yes.  Embarrassing.
> 
> > Checking for full-circle DNS already does most of this. 
> 
> My home dynamic cablemodem address passes full-circle DNS.  But not this.
> So this is far more useful for checking if an IP is a legitimate sending
> mail server.
> 
> > What your
> > scheme would do is check for otherwise legitimate servers that have
> > been compromised and are delivering direct-to-mx. 
> 
> An otherwise legitimate but compromised mail server would not be detected
> by this.  I'm curious why you interpreted it differently.
> 
> 
> On 02/09, Charles Gregory wrote:
> > On Mon, 2010-02-08 at 22:08 -0500, dar...@chaosreigns.com wrote:
> 
> > What you describe here is functionally similar to an SPF lookup with a  
> > 'pass' result. The server provides positive verification that the 
> > listed IP is a legitimate sender for that domain.
> 
> Yes.
> 
> > As long as 'otherwise' is a definitive 'fail' response from an SPF (or  
> > equivalent) server, and not merely an absence of SPF server
> 
> Yes.  Definitive "fail".
> 
> > Your method would allow 'spoofing' so that a spammer who hacks a  
> > legitimate server can use a valid return address on a different domain,  
> > but still the mail would receive a 'passing' grade. At least, with SPF,  
> > the spammer must forge an address on the hacked domain, which increases  
> > the likelihood of detection
> 
> Yes.  I would blacklist domains that "pass" hacked servers.  Just as IPs of
> hacked servers are blacklisted.  They're sending spam, and need to be
> fixed.
> 
> >> Forwarding doesn't break.
> >
> > Ah, so you want to allow 'legitimate' forwarding, but not allow spammers  
> > to 'forward' their mail? Good luck with that. The only way to make it 
> > work for the legitimate sender, but not for spammers is to have a 
> > mechanism built-in to the forwarding server that encapsulates or rewrites 
> > the envelope 'From' address.
> 
> Encapsulating or rewriting the envelope 'From' address seems significantly
> less likely to be adopted from what I've read.
> 
> >> Obviously you'd need a blacklist of spammer domains that list spamming
> >> IPs as legit senders.
> >
> > And you would be playing the same 'musical chairs' game with new domains  
> > created by spammers on a daily basis. All the same flaws of SPF, and no  
> > greater benefit.
> 
> Same domain blacklisting issues as SPF, yes.  
> 
> I am not very concerned about the throw-away domains because
> I'll reject all mail from domains not at least 10 days old.  10+
> day old domains are already listed as 127.0.2.3 records from
> example.com.hostkarma.junkemailfilter.com.
> 
> I believe the benefit of not breaking forwarding is sufficient to make it
> much more useful than SPF for spam filtering.  I've come across enough
> people, personally, recently, in trying to block (some = positive SA
> score) emails without an SPF "pass", who are not willing to ever implement
> SPF due to breaking forwarding that I believe this would be useful.
> 
> >> Is there any way this wouldn't be very u

Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread RW
On Tue, 9 Feb 2010 18:02:09 -0500
dar...@chaosreigns.com wrote:

> On 02/09, RW wrote:
> > > And everything that it didn't block could be blocked by
> > > blacklisting domains which have MTX records for spamming IPs.
> > 
> > The same thing applies to full circle DNS
> 
> So you want to blacklist all domains that have *any* PTR records for
> IPs that send spam?

Perhaps you should google full-circle dns if you don't understand what
it means. Essentially there's little difference, unless you are happy
to ignore spammers that get blacklisted and then remove the MTX
record. If you are, then there's little point to listing them in the
first place.

> > > > Every thing else is either handled by full-circle and no DNS
> > > > tests,
> > > 
> > > Full circle DNS tests don't block spam from quite a lot of IPs.
> > 
> > But how many of those are neither mail-servers, nor spammer
> > controlled ip ranges. 
> 
> A lot?  Spam bot nets.

Spambots don't have full-circle DNS. 

> > The chief problem is that there is no way to use this scheme until
> > it has *very* high adoption, below 95% it wouldn't even be worth
> > scoring
> 
> As I recently posted, it can be used for whitelisting (after
> blacklisting) immediately.  And that use could increase creation of
> the relevant records gradually until they're wide spread.

How could your scheme be used for whitelisting when a huge amount of
spam comes through mail-servers that send a mixture of spam and ham?
Would you really want to whitelist hotmail? This kind of argument was
made about SPF - a pass still scores -0.001.

SPF has a limited amount of enlightened self-interest about it. If you
publish SPF records you get less backscatter - your scheme doesn't do
that. There's nothing in your scheme to encourage anyone to use it.


> > at 0.5 in Spamassassin. With SPF you at least know the difference
> > between a fail and a non-adopter. Whilst you could identify
> > compliant servers there's no way that that would warrant anthing
> > more than a nominal negative score. SPF_PASS scores -0.001
> 
> Only with a domain blacklist.

So why would anyone use it and risk being blacklisted, what's the point
of it existing if you don't punish domains that don't join - any that
get on the blacklist could just drop-out of the scheme.



Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Kris Deugau

dar...@chaosreigns.com wrote:

On 02/09, Kris Deugau wrote:
I'm still not seeing the whole picture;  maybe you can explain the  
difference between these two cases:


1) Legitimate sender, uses the NAT machine as the legitimate, designated  



(10.0.0.2) with a certain rDNS (exchange.smallbusiness.com).
2) Spam, from an infected machine on the same LAN, either via relay  



(10.0.0.2) with a certain rDNS (exchange.smallbusiness.com).


The IP is sending spam, so it gets blacklisted (by a blacklist of domains
which have MTX records for spamming IPs).


... So what incentive do I as:  (pick any one or more hats below)

ISP mail/DNS admin
Colo/self-hosted domain admin
Inbound mail admin

have to either set up this extra A record, or check for it, that 
existing blacklists don't provide?  Chicken<->egg.


Where do you draw the lines for adding someone to a/the blacklist? 
0.0001% spam?  0.01%?  1%?


How would you publish the blacklist?  Globally?  Rely on individual 
local DNS operators running their own blacklist?  (Good luck getting 
*off* ten million local blacklists...)



Two options where smallbusiness.com doesn't have the ability to define its
own PTR records.  For example, the PTR record is defined by isp.com.

1) isp.com sets the PTR record to exchange.smallbusiness.isp.com, and
   creates the MTX record for it (2.0.0.10.mtx.smallbusiness.isp.com
   with a value of 127.0.0.1).  If 10.0.0.2 sends spam, isp.com gets
   blacklisted.


Immediately?  Would you *really* blacklist eg AOL, Hotmail, or Gmail if 
you received *one* spam from any of their networks?


If you have paying customers using your mail systems, you'd be out of 
business in a matter of months.



2) isp.com sets the PTR record to exchange.smallbusiness.com, and
   smallbusiness.com creates their own MTX record
   (2.0.0.10.mtx.smallbusiness.com = 127.0.0.1).  If 10.0.0.2 sends spam,
   smallbusiness.com gets blacklisted.


 and some arbitrary (sub^n)domain A record based on the PTR.


Yes.  That's all.  What format should this arbitrary A record be?


Aside from considerations above, what you've posted is fine, 
structurally.  From a pure "how to publish data" perspective, a new DNS 
RR type would be slightly better, but reversed IPs concatenated to a 
subdomain is a well-established way to publish this type of data.


About all your scheme seems to do is identify IPs which may emit  
legitimate email, generally;  it's certainly nothing I'd score at  
anything more than an advisory -0.001 in SA.


Of course, unless you use a blacklist of domains which have MTX records for
spamming domains.


Well, aside from getting tougher on customers with infected systems, how 
do you propose to actually stop the spam from being generated?  If you 
can't stop that, you-as-ISP *CAN NOT* fully prevent spam from being 
relayed through your servers unless you unplug the network and power 
cables...


Consider the case of a legitimate ISP's outbound relay - most of the  
mail is perfectly legitimate, but sooner or later *someone* on an IP  
controlled by that ISP (and therefore allowed to relay through that  
outbound relay host) will have their machine infected or someone with an  
account with that ISP will have their password stolen, and then that  
infected machine will spew out junk via the relay, or a machine  
somewhere else will use that stolen password to send SMTP AUTH mail  
through that relay


We regularly see both of those cases here (medium-sided ISP).


It's an issue of blacklisting.  What is involved in keeping your ISP off of
IP blacklists?


Blocking outbound connections to port 25 from residential IP blocks, 
responding to reports (cutting of residential customers found to be 
infected, warning and eventually cutting off static-IP business 
customers;  notifying users whose passwords seem to have been cracked or 
stolen - among other standard measures).  It helps, and we've signed up 
for the feedback loop widgets with a number of places (AOL, Comcast), 
but there is NO WAY we can absolutely stop all spam from emitting from 
IP space under our control, short of turning off our core routers.


This is not exactly unusual.

The more I think about it and the more I read of what you're describing,  
the more most of it seems like a reasonable component of any blacklist  
operation, not a whole FUSSP[1] in its own right.


[1] http://www.claws-and-paws.com/fussp.html, among other references


I have been directed to that url frequently in the last few days :)


  The form may be a bit tongue-in-cheek, but taking it at face value 
is helpful in seeing if you're really trying something new, or if you're 
just putting a new coat of paint on something that's already in practice 
as a small subset of a larger operation.  (Or trying to resurrect a dead 
horse that was already beaten to a thin paste ten years ago.  I don't 
think you've gotten *that* far yet.)


TBH, what you seem to be trying to do seems far better suited to a local 
syste

Re: [sa] Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Charles Gregory

On Tue, 9 Feb 2010, dar...@chaosreigns.com wrote:

Charles:  Thanks, I clearly need to lay out implementation sequence.


Sorry to be wasting your time, but I am smart enough to have grasped it 
from your previous e-mails. You just WANT your solution to be magically 
adopted by everyone and you seem to be completely dismissing/ignoring the 
real and practical improbability of any widespread implementation



Are you willing to, right now, create a .mtx. DNS
record for all your transmitting mail servers?  If not, why not?


Because it does not benefit me or my users. You have failed to convince me 
that any significant widespread implementation will occur, and have not 
demonstrated any signficant new benefits that make your idea any more 
appealing than existing SPF and white/blacklists. For me, it is 
simpler to forward mail in an SPF-compatible fashion, and require SMTP 
Auth through one server designated with SPF-PASS. Haven't done that yet, 
for similar reasons. :)



Any thoughts on the format of that record yet?


Take a look at the format used by SPF. You are eliminating the 
cross-reference to sender address, but otherwise, all the subtle nuances 
are the same. Which still leads me back to 'why should I bother to 
participate in reinventing the wheel'


Anyways, this is my fin du conversation

- C


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread RW
On Tue, 9 Feb 2010 14:15:37 -0500
dar...@chaosreigns.com wrote:

> On 02/09, RW wrote:
> > A compromised webserver with full-circle DNS would be caught by
> > this. My point is that is the only class of spam that this could
> > help with
> 
> Ah, sorry, I thought you meant mail server.
> 
> Still, I don't understand why you're saying this.
> 
> It would also block, for example, spam from a dynamic cablemodem IP.

Aside from a few corner cases, I don't see any advantage over checking
for full circle DNS

> And everything that it didn't block could be blocked by blacklisting
> domains which have MTX records for spamming IPs.

The same thing applies to full circle DNS

> > Every thing else is either handled by full-circle and no DNS tests,
> 
> Full circle DNS tests don't block spam from quite a lot of IPs.

But how many of those are neither mail-servers, nor spammer controlled
ip ranges. My guess is that the kind of spam your  scheme would
identify is mostly caught by other means.

The chief problem is that there is no way to use this scheme until it
has *very* high adoption, below 95% it wouldn't even be worth scoring
at 0.5 in Spamassassin. With SPF you at least know the difference
between a fail and a non-adopter. Whilst you could identify compliant
servers there's no way that that would warrant anthing more than a
nominal negative score. SPF_PASS scores -0.001


> > or can be easily worked around by spammers setting their own dns.
> 
> Spammers can't create DNS records for hostnames for IPs they don't own
> (don't have PTR authority delegated to them for).

I was referring to IP ranges that they do control


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Bowie Bailey
dar...@chaosreigns.com wrote:
> "For every complex problem, there is a solution that is simple, neat,
> and wrong." - H. L. Mencken

I think your auto-quote program is trying to tell you something...  :)

-- 
Bowie


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Darxus
On 02/09, Kris Deugau wrote:
> I'm still not seeing the whole picture;  maybe you can explain the  
> difference between these two cases:
>
> 1) Legitimate sender, uses the NAT machine as the legitimate, designated  

> (10.0.0.2) with a certain rDNS (exchange.smallbusiness.com).
> 2) Spam, from an infected machine on the same LAN, either via relay  

> (10.0.0.2) with a certain rDNS (exchange.smallbusiness.com).

The IP is sending spam, so it gets blacklisted (by a blacklist of domains
which have MTX records for spamming IPs).

> Obviously I've missed *something* about what you've been trying to  
> describe, but I haven't seen any indication that you're working with  
> **ANYTHING** other than the PTR record 

Yes.

> for the (apparent) originating IP  

Nothing apparent about it.  The delivering IP (last untrusted relay) is
the only thing in an email that can't be forged.

> (which, for a small business on a single static-IP connection, may or  
> may not even have anything to do with the business's own domain(s) at  
> all), 
 
Indeed, so they would need to get whoever is delegated the authority to
provide PTR records for that IP to create the necessary records.

Two options where smallbusiness.com doesn't have the ability to define its
own PTR records.  For example, the PTR record is defined by isp.com.

1) isp.com sets the PTR record to exchange.smallbusiness.isp.com, and
   creates the MTX record for it (2.0.0.10.mtx.smallbusiness.isp.com
   with a value of 127.0.0.1).  If 10.0.0.2 sends spam, isp.com gets
   blacklisted.

2) isp.com sets the PTR record to exchange.smallbusiness.com, and
   smallbusiness.com creates their own MTX record
   (2.0.0.10.mtx.smallbusiness.com = 127.0.0.1).  If 10.0.0.2 sends spam,
   smallbusiness.com gets blacklisted.

>  and some arbitrary (sub^n)domain A record based on the PTR.

Yes.  That's all.  What format should this arbitrary A record be?

> About all your scheme seems to do is identify IPs which may emit  
> legitimate email, generally;  it's certainly nothing I'd score at  
> anything more than an advisory -0.001 in SA.

Of course, unless you use a blacklist of domains which have MTX records for
spamming domains.

> Consider the case of a legitimate ISP's outbound relay - most of the  
> mail is perfectly legitimate, but sooner or later *someone* on an IP  
> controlled by that ISP (and therefore allowed to relay through that  
> outbound relay host) will have their machine infected or someone with an  
> account with that ISP will have their password stolen, and then that  
> infected machine will spew out junk via the relay, or a machine  
> somewhere else will use that stolen password to send SMTP AUTH mail  
> through that relay
>
> We regularly see both of those cases here (medium-sided ISP).

It's an issue of blacklisting.  What is involved in keeping your ISP off of
IP blacklists?

> The more I think about it and the more I read of what you're describing,  
> the more most of it seems like a reasonable component of any blacklist  
> operation, not a whole FUSSP[1] in its own right.
>
> [1] http://www.claws-and-paws.com/fussp.html, among other references

I have been directed to that url frequently in the last few days :)

-- 
"For every complex problem, there is a solution that is simple, neat,
and wrong." - H. L. Mencken
http://www.ChaosReigns.com


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Darxus
Charles:  Thanks, I clearly need to lay out implementation sequence.

1) People who are sufficiently entertained by the subject create MTX
   records for our servers, and collect blacklists of domains which
   create MTX records for spamming IPs.

2) New SA capability is implemented:
   A) Blacklisting by the domain of the PTR record of the sending IP (MTX_BL).
   B) Verifying IPs against MTX records (MTX_PASS / MTX_FAIL).

3) Conservative people use these new tests to reduce false positives:
   score MTX_BL 1
   score MTX_PASS -1# Only hit if MTX_BL wasn't.
   score MTX_FAIL 0.001 

   People with less need to be conservative, perhaps with SA configured
   to report false positives to non-forged senders, use more aggressive
   scores:
   score MTX_BL 2
   score MTX_PASS -2
   score MTX_FAIL 1

4) In order to reduce false positives, more people create MTX records.

5) Due to 4, MTX_FAIL scores can safely be increased slightly without
   increasing false positives.

6) Go to 4.


One day, due to steps 4-6, enough people have created MTX records that all
email without one can reasonably be rejected by the MTA.


Are you willing to, right now, create a .mtx. DNS
record for all your transmitting mail servers?  If not, why not?

Any thoughts on the format of that record yet?


On 02/09, Charles Gregory wrote:
> LOL Good luck with that. The first time that an important e-mail  
> correspondent (money!) is blocked by such a 'default' setting, the
> sysadmins will be rushing to cripple this default action. You will never  
> succeed in introducing ANY spam filtering system that blocks mail based  
> upon an 'undecided' or 'neutral' status.

This is a good point.  This is also why I suggested starting out with a
low score, for most people.  

Of course I'll use something around 4 to 4.5.

>> I disagree.  I can implement it now (in fact I expect to...
>
> For your own use, sure. But that's just like SPF. A bunch of people will  
> use it, and a bunch, including ones that you still *really* want to  
> communicate with, will NOT. Have you figured out how you are going to 
> sell 'hotmail' and 'gmail' on your idea? Or are you just going to block 
> all mail from them? Your choice. But if you have multiple users, well, 
> you had better choose conservatively. (grin)

Did my implementation sequence above sufficiently cover this?  

Even with a MTX_FAIL score of 4.5, it still won't block the vast majority
of email I get from gmail.  And I certainly wouldn't switch to blocking all
email without an MTX record without gmail adopting them.  And I do think
there is a decent possibility of gmail eventually adopting MTX records due
to the sequence I described.

> And every hotmail user will be writing to the you complaining they have 
> no way to talk hotmail into adopting your system, and begging you

The vast majority of legit mail will still get through even with my high
MTX_FAIL score.  And if the complaints get annoying, I'll lower it.  And
really, everybody that's currently getting a score of 0.5+ score from SA,
I'm happy to never hear from again.

And even if nobody gives MTX_FAIL a positive score, I still expect MTX
records to be adopted to reduce false positives, making it reasonable to
gradually use slightly higher MTX_FAIL scores.

>> I think you missed something important.  Creating the records I suggest 
>> can create no false positives.  That point is critical to this idea.
>
> The FP's would occur on the systems *looking* for those records, and  
> scoring positively in SA for simply not finding them. Your argument, and  
> all of mine here, are not about the simplistic task of creating a DNS  
> record, but about the battle to have the scoring/testing protocol  
> implemented to make those records 'useful'.

No, actually, I was arguing for the simplicity of creating the DNS records.
I realize it'll be a while before major email providers start giving
MTX_FAIL significant positive values.  The records are immediately useful
for whitelisting to reduce false positives.

-- 
"We will be dead soon. Is this how we want to live?"
http://www.ChaosReigns.com


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Kris Deugau

dar...@chaosreigns.com wrote:

On 02/09, Kris Deugau wrote:

Spammer mail originates from 10.0.0.2 (static IP assigned by ISP).

PTR record is 2.0.0.10.in-addr.arpa -> exchange.smallbusiness.com

2.0.0.10.mtx.exchange.smallbusiness.com -> 127.0.0.1 because this is the  
recognized designated outbound relay for Small Business's legitimate  
mail, and they've followed your proposal.


How is the spam to be *not* considered a legitimate sender in this case?  
 Even if the Exchange server isn't actually processing the email, its  
public IP will still be the originating IP of the message.


Blacklist the validating domain smallbusiness.com.  Reject all email that
has a *.mtx.*.smallbusiness.com record.  Just as you would blacklist
the sending IP for spamming.  As with SPF, I expect this to be quite a lot
easier than maintaining a blacklist of spamming IPs.  If I'm wrong on that
one point, this is useless.


I'm still not seeing the whole picture;  maybe you can explain the 
difference between these two cases:


1) Legitimate sender, uses the NAT machine as the legitimate, designated 
relayhost.


So far as a remote system is concerned, the mail originates from an IP 
(10.0.0.2) with a certain rDNS (exchange.smallbusiness.com).


Remote system takes the IP, gets the PTR, and looks up 
2.0.0.10.mtx.exchange.smallbusiness.com, and gets 127.0.0.1.  Yay!  Good 
mail, let's let it through!


2) Spam, from an infected machine on the same LAN, either via relay 
through the NAT box, or using its own SMTP engine to do direct-to-MX


So far as a remote system is concerned, the mail originates from an IP 
(10.0.0.2) with a certain rDNS (exchange.smallbusiness.com).


Remote system takes the IP, gets the PTR, and looks up 
2.0.0.10.mtx.exchange.smallbusiness.com, and gets 127.0.0.1.  Yay!  Good 
mail, let's let it through!



Would you still like more detail on what pieces of information I'm looking
at, and where I'm getting them from?


Obviously I've missed *something* about what you've been trying to 
describe, but I haven't seen any indication that you're working with 
**ANYTHING** other than the PTR record for the (apparent) originating IP 
(which, for a small business on a single static-IP connection, may or 
may not even have anything to do with the business's own domain(s) at 
all), and some arbitrary (sub^n)domain A record based on the PTR.


About all your scheme seems to do is identify IPs which may emit 
legitimate email, generally;  it's certainly nothing I'd score at 
anything more than an advisory -0.001 in SA.


Consider the case of a legitimate ISP's outbound relay - most of the 
mail is perfectly legitimate, but sooner or later *someone* on an IP 
controlled by that ISP (and therefore allowed to relay through that 
outbound relay host) will have their machine infected or someone with an 
account with that ISP will have their password stolen, and then that 
infected machine will spew out junk via the relay, or a machine 
somewhere else will use that stolen password to send SMTP AUTH mail 
through that relay


We regularly see both of those cases here (medium-sided ISP).

The more I think about it and the more I read of what you're describing, 
the more most of it seems like a reasonable component of any blacklist 
operation, not a whole FUSSP[1] in its own right.


[1] http://www.claws-and-paws.com/fussp.html, among other references

-kgd


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Charles Gregory

On Tue, 9 Feb 2010, dar...@chaosreigns.com wrote:

So rather than mimicing SPF, you want to mimic the effect of various
IP-based blacklists to which an ISP can report all of its 'unauthorized'
IP's (typicalyl dynamic IP blocks)?

Basically, except of course that the default, when not participating, is
effectively blacklisting (in the sense in which SA uses blacklists to
increase the spammines score of an email).


LOL Good luck with that. The first time that an important e-mail 
correspondent (money!) is blocked by such a 'default' setting, the
sysadmins will be rushing to cripple this default action. You will never 
succeed in introducing ANY spam filtering system that blocks mail based 
upon an 'undecided' or 'neutral' status.


. Large companies which frequently reorganize their IP blocks will 
shy away from such a system, and smaller companies will lack the 
time/resources to implement anything that isn't 'out of the box'.


I disagree.  I can implement it now (in fact I expect to...


For your own use, sure. But that's just like SPF. A bunch of people will 
use it, and a bunch, including ones that you still *really* want to 
communicate with, will NOT. Have you figured out how you are going to sell 
'hotmail' and 'gmail' on your idea? Or are you just going to block all 
mail from them? Your choice. But if you have multiple users, well, you had 
better choose conservatively. (grin)



So I block some more spam, and I get some extra false positives, and the
senders get notified.


And every hotmail user will be writing to the you complaining they 
have no way to talk hotmail into adopting your system, and begging you
to *remove* the 'block'. And if you stick to your guns, those are people 
who, by no choice of their own, you will not hear from again. And if you 
have users who stop hearing from good friends and relatives, they won't be 
yuour users much longer.


As I said before, 'in a perfect world' your idea would work.
But sadly, not in THIS one

I think you missed something important.  Creating the records I suggest 
can create no false positives.  That point is critical to this idea.


The FP's would occur on the systems *looking* for those records, and 
scoring positively in SA for simply not finding them. Your argument, and 
all of mine here, are not about the simplistic task of creating a DNS 
record, but about the battle to have the scoring/testing protocol 
implemented to make those records 'useful'.



Either they participate, and get their sending IPs whitelisted, or they
don't participate, and they don't get their IPs whitelisted and mail from
those IPs is more likely to be flagged as spam.


Expressed as a 'whitelist only' mechanism that at least opens the door to 
a possibility of avoiding the fears of implementation, but again, you face 
the same lethargy and fear that keeps SPF from benig widely adopted



Good to know.  It still doesn't concern me.  This would still eliminate
spams from the vast majority of IPs for which spammers aren't delegated to
host PTR records.  And if all spam has a verified paper trail (delivering
IP -> domain -> registrar who can be subpoened), I think the sending of
spam itself will be a lot easier to stop.


If ISP's just blocked port 25 access for their DSL customers a great deal 
of spam would be stopped. And that is SO easy to do. Think about that. If 
you can't even talk ISP's into such a simple approach, truly free of any 
false positive, then how can you expect 'reason' regarding a system that 
you admit has to have a bigger chance of false postitives?



Except that it causes me no problems if they don't implement my
whitelisting.


Then it will cuase you no problem at all if they just don't implement 
anything at all?



Those administrators will say that they do not have control over DNS,
because that's done at a higher organizational level, or that they don't
want to do something that is not 'standard' and will tell their users to
find another way to communicate with you.

I'm comfortable with that possibility.  As I said, I expect benefit even
without people participating.


Is this 'all about you'? If so, then just whitelist your own 
correspondents and save us all the trouble of debating a DNS PTR system 
that benefits no one but you. If you intend to introduce a new idea for 
broad adoption, then it needs to benefit everyone. And 'everyone' is not 
giong to be 'comfortable with that possibility' that you are :)


- C


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Darxus
On 02/09, RW wrote:
> A compromised webserver with full-circle DNS would be caught by this.
> My point is that is the only class of spam that this could help with

Ah, sorry, I thought you meant mail server.

Still, I don't understand why you're saying this.

It would also block, for example, spam from a dynamic cablemodem IP.

And everything that it didn't block could be blocked by blacklisting
domains which have MTX records for spamming IPs.

> Every thing else is either handled by full-circle and no DNS tests,

Full circle DNS tests don't block spam from quite a lot of IPs.

> or can be easily worked around by spammers setting their own dns.

Spammers can't create DNS records for hostnames for IPs they don't own
(don't have PTR authority delegated to them for).

-- 
"Life is but a walking shadow, a poor player that struts and frets his
hour upon the stage--and then is heard no more. It is a tale told by an
idiot, full of sound and fury, signifying nothing." - William Shakespeare
http://www.ChaosReigns.com


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Darxus
On 02/09, dar...@chaosreigns.com wrote:
> Anything else is undefined (0 SA score) for future options.

This won't work.  Everything lacking a 127.0.0.1 record needs to be a
"fail", otherwise spammers can create undefined records to circumvent this.


On 02/09, Charles Gregory wrote:
> So rather than mimicing SPF, you want to mimic the effect of various  
> IP-based blacklists to which an ISP can report all of its 'unauthorized'  
> IP's (typicalyl dynamic IP blocks)?

Basically, except of course that the default, when not participating, is
effectively blacklisting (in the sense in which SA uses blacklists to
increase the spammines score of an email).

> The obvious drawback is the same for your system as the already existing  
> dynamic-ip blackilsts, which is that it only works when domains take the  
> time and trouble to register either their 'authorized' (in your case) or  
> 'unauthorized' (for the blacklist) ranges of IP's. Large companies which  
> frequently reorganize their IP blocks will shy away from such a system,  
> and smaller companies will lack the time/resources to implement anything  
> that isn't 'out of the box'.

I disagree.  I can implement it now (in fact I expect to, which is why I'd
really like feedback on the A record format).  

So I block some more spam, and I get some extra false positives, and the
senders get notified.  And the senders can try to get the relevant MTX
records created if they want.  And maybe along the way these MTX records
become a little more common, and I can increase the spam score of emails
without MTX records and block some more spam without further increasing
false positives.  And maybe eventually, as a result of this iterative
process, enough people create MTX records that I can reject all email
without one.

Having looked over the scores of my non-spams, I'm comfortable with the
additional false positives up to an additional score of 4.5, as long as the
sender is notified and has some possibility of eliminating that additional
score.

Others might be more comfortable with an additional score of 1.  Still, you
catch more spams, cause a few false positives, and the senders have the
possibility of fixing the false positives.

> Unlikely in many cases, but I would quibble over 'less'. Overall, most  
> corporate minds seem to think that they prefer false negatives to false  
> positives, so they are extremely reluctant to adopt any strategy that  
> increases the chance of a false positive, even under such strange  

I think you missed something important.  Creating the records I suggest can
create no false positives.  That point is critical to this idea.

Either they participate, and get their sending IPs whitelisted, or they
don't participate, and they don't get their IPs whitelisted and mail from
those IPs is more likely to be flagged as spam.

Unless they send spam, in which case they'll get blacklisted.  Which would
be worse than not participating.  So they should be really sure not to
whitelist any IPs that send spam.  And of course just as in existing IP
blacklists, it is worth taking someone off a blacklist if they have
corrected their spam problem.  Not flawless, but still way easier than
maintaining an IP blacklist.

> Another feature already covered by a blacklist, and, already being  
> bypassed by numerous spammers who are smart enough to buy a domain name  
> months before they use it. (shrug)

Good to know.  It still doesn't concern me.  This would still eliminate
spams from the vast majority of IPs for which spammers aren't delegated to
host PTR records.  And if all spam has a verified paper trail (delivering
IP -> domain -> registrar who can be subpoened), I think the sending of
spam itself will be a lot easier to stop.

> But *why* do they refuse to 'fix' their forwarding? I strongly suspect 

I don't know.

> that the same reasoning would apply to their decision to not implement 
> SPF or your IP-based filter idea.

Except that it causes me no problems if they don't implement my
whitelisting.

On 02/09, Charles Gregory wrote:
> Those administrators will say that they do not have control over DNS,  
> because that's done at a higher organizational level, or that they don't  
> want to do something that is not 'standard' and will tell their users to  
> find another way to communicate with you. Same BS that is used to dodge  

I'm comfortable with that possibility.  As I said, I expect benefit even
without people participating.  

-- 
"The most merciful thing in the world, I think, is the inability of the
human mind to correlate all its contents."
http://www.ChaosReigns.com


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread RW
On Tue, 9 Feb 2010 11:42:07 -0500
dar...@chaosreigns.com wrote:

> On 02/09, RW wrote:

> > What your
> > scheme would do is check for otherwise legitimate servers that have
> > been compromised and are delivering direct-to-mx. 
> 
> An otherwise legitimate but compromised mail server would not be
> detected by this.  I'm curious why you interpreted it differently.

A compromised webserver with full-circle DNS would be caught by this.
My point is that is the only class of spam that this could help with

Every thing else is either handled by full-circle and no DNS tests,
or can be easily worked around by spammers setting their own dns.






Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Charles Gregory

On Tue, 9 Feb 2010, dar...@chaosreigns.com wrote:

When I implement this, senders will get an error asking them to ask
their administrator to create the necessary record.


Those administrators will say that they do not have control over DNS, 
because that's done at a higher organizational level, or that they don't 
want to do something that is not 'standard' and will tell their users to 
find another way to communicate with you. Same BS that is used to dodge 
SPF. It's not that your idea is 'bad', it's just not that much different 
from SPF in terms of the roadbblocks to its effective adoption.


Don't blame you for trying. Actually wish it worked. :)

- Charles



Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Charles Gregory

On Tue, 9 Feb 2010, dar...@chaosreigns.com wrote:

My home dynamic cablemodem address passes full-circle DNS.  But not this.
So this is far more useful for checking if an IP is a legitimate sending
mail server.


So rather than mimicing SPF, you want to mimic the effect of various 
IP-based blacklists to which an ISP can report all of its 'unauthorized' 
IP's (typicalyl dynamic IP blocks)?


The obvious drawback is the same for your system as the already existing 
dynamic-ip blackilsts, which is that it only works when domains take the 
time and trouble to register either their 'authorized' (in your case) or 
'unauthorized' (for the blacklist) ranges of IP's. Large companies which 
frequently reorganize their IP blocks will shy away from such a system, 
and smaller companies will lack the time/resources to implement anything 
that isn't 'out of the box'.


Encapsulating or rewriting the envelope 'From' address seems 
significantly less likely to be adopted from what I've read.


Unlikely in many cases, but I would quibble over 'less'. Overall, most 
corporate minds seem to think that they prefer false negatives to false 
positives, so they are extremely reluctant to adopt any strategy that 
increases the chance of a false positive, even under such strange 
conditions as a hack Indeed, given that there are no issues of false 
positives from rewriting the envelope sender, one could argue that it is 
the change *most* likely to be adopted, and therefore it has significance 
that it is not being adopted by everyone



I am not very concerned about the throw-away domains because
I'll reject all mail from domains not at least 10 days old.


Another feature already covered by a blacklist, and, already being 
bypassed by numerous spammers who are smart enough to buy a domain name 
months before they use it. (shrug)


I believe the benefit of not breaking forwarding is sufficient to make 
it much more useful than SPF for spam filtering. I've come across 
enough people, personally, recently, in trying to block (some = positive 
SA score) emails without an SPF "pass", who are not willing to ever 
implement SPF due to breaking forwarding that I believe this would be 
useful.


But *why* do they refuse to 'fix' their forwarding? I strongly 
suspect that the same reasoning would apply to their decision to 
not implement SPF or your IP-based filter idea.


- C


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Darxus
On 02/09, Kris Deugau wrote:
> Spammer mail originates from 10.0.0.2 (static IP assigned by ISP).
>
> PTR record is 2.0.0.10.in-addr.arpa -> exchange.smallbusiness.com
>
> 2.0.0.10.mtx.exchange.smallbusiness.com -> 127.0.0.1 because this is the  
> recognized designated outbound relay for Small Business's legitimate  
> mail, and they've followed your proposal.
>
> How is the spam to be *not* considered a legitimate sender in this case?  
>  Even if the Exchange server isn't actually processing the email, its  
> public IP will still be the originating IP of the message.

Blacklist the validating domain smallbusiness.com.  Reject all email that
has a *.mtx.*.smallbusiness.com record.  Just as you would blacklist
the sending IP for spamming.  As with SPF, I expect this to be quite a lot
easier than maintaining a blacklist of spamming IPs.  If I'm wrong on that
one point, this is useless.

Would you still like more detail on what pieces of information I'm looking
at, and where I'm getting them from?

-- 
"Anarchy is based on the observation that since few are fit to rule
themselves, even fewer are fit to rule others." -Edward Abbey
http://www.ChaosReigns.com


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Kris Deugau

dar...@chaosreigns.com wrote:

I apparently need to clarify that I think this is a good idea because I am
concerned about the number of people (who control DNS records) who are very
strongly against creating SPF records specifically because of forwarding
breakage.  The email I got in response to my request for my employer to
create an SPF record included the word "abomination".  From a friend.
I don't entirely agree, but it is a problem for adoption.

This is entirely an attempt to replicate the functionality of SPF without
breaking forwarding, and without causing other problems that might
discourage adoption.


I set this up for my mail server (using mtx instead of designatedsender):

$ host -t PTR 64.71.152.40
40.152.71.64.in-addr.arpa domain name pointer panic.chaosreigns.com.

$ host -t A 40.152.71.64.mtx.panic.chaosreigns.com
40.152.71.64.mtx.panic.chaosreigns.com has address 127.0.0.1

All it took was creating a single record in bind:

40.152.71.64.mtx.panic.chaosreigns.com. IN A 127.0.0.1


I'll define it slightly differently:
127.0.0.1 is a pass (negative SA score).
not found is a fail (positive SA score).
127.0.0.0 is a fail (positive SA score).
Anything else is undefined (0 SA score) for future options.


I'd still appreciate feedback on the format of the A record.


Can you be a little more detailed on exactly which pieces of information 
you're looking at, and where you're getting them from?


So far as I've been able to make out from your descriptions so far, this 
is a smallish subset of the functionality SPF provides, without the 
disadvantage of overloading TXT records.


Consider:  Spammer has control of a PC on a small(ish)-business LAN 
whose NAT gateway also handles their mail.  (Exchange server, for 
instance - far too common a configuration IMO.)


Spammer mail originates from 10.0.0.2 (static IP assigned by ISP).

PTR record is 2.0.0.10.in-addr.arpa -> exchange.smallbusiness.com

2.0.0.10.mtx.exchange.smallbusiness.com -> 127.0.0.1 because this is the 
recognized designated outbound relay for Small Business's legitimate 
mail, and they've followed your proposal.


How is the spam to be *not* considered a legitimate sender in this case? 
 Even if the Exchange server isn't actually processing the email, its 
public IP will still be the originating IP of the message.


SPF at least ties some aspect of the message itself to the relay IP in 
some way.  (Whether that's good or bad I'll ignore for the moment.)


-kgd


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Darxus
Another point of clarification on why I think this will work:

I'm running SA as a pre-queue content_filter from postfix, so when SA
decides an email is spam, non-forged senders get an error, without sending
backscatter to forged addresses.

When I implement this, senders will get an error asking them to ask
their administrator to create the necessary record.

And I see no reason for that administrator not to create that record.


The directions I followed to set up SA this way are half way down this
page:
http://wiki.apache.org/spamassassin/IntegratePostfixViaSpampd
(Be sure to do the --sef and X-Envelope-From bits.)

-- 
"I'd rather be happy than right any day."
- Slartiblartfast, The Hitchhiker's Guide to the Galaxy
http://www.ChaosReigns.com


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Darxus
I apparently need to clarify that I think this is a good idea because I am
concerned about the number of people (who control DNS records) who are very
strongly against creating SPF records specifically because of forwarding
breakage.  The email I got in response to my request for my employer to
create an SPF record included the word "abomination".  From a friend.
I don't entirely agree, but it is a problem for adoption.

This is entirely an attempt to replicate the functionality of SPF without
breaking forwarding, and without causing other problems that might
discourage adoption.


I set this up for my mail server (using mtx instead of designatedsender):

$ host -t PTR 64.71.152.40
40.152.71.64.in-addr.arpa domain name pointer panic.chaosreigns.com.

$ host -t A 40.152.71.64.mtx.panic.chaosreigns.com
40.152.71.64.mtx.panic.chaosreigns.com has address 127.0.0.1

All it took was creating a single record in bind:

40.152.71.64.mtx.panic.chaosreigns.com. IN A 127.0.0.1


I'll define it slightly differently:
127.0.0.1 is a pass (negative SA score).
not found is a fail (positive SA score).
127.0.0.0 is a fail (positive SA score).
Anything else is undefined (0 SA score) for future options.


I'd still appreciate feedback on the format of the A record.


On 02/09, RW wrote:
> You've mixed-up A record and PTR record. 

Yes.  Embarrassing.

> Checking for full-circle DNS already does most of this. 

My home dynamic cablemodem address passes full-circle DNS.  But not this.
So this is far more useful for checking if an IP is a legitimate sending
mail server.

> What your
> scheme would do is check for otherwise legitimate servers that have
> been compromised and are delivering direct-to-mx. 

An otherwise legitimate but compromised mail server would not be detected
by this.  I'm curious why you interpreted it differently.


On 02/09, Charles Gregory wrote:
> On Mon, 2010-02-08 at 22:08 -0500, dar...@chaosreigns.com wrote:

> What you describe here is functionally similar to an SPF lookup with a  
> 'pass' result. The server provides positive verification that the 
> listed IP is a legitimate sender for that domain.

Yes.

> As long as 'otherwise' is a definitive 'fail' response from an SPF (or  
> equivalent) server, and not merely an absence of SPF server

Yes.  Definitive "fail".

> Your method would allow 'spoofing' so that a spammer who hacks a  
> legitimate server can use a valid return address on a different domain,  
> but still the mail would receive a 'passing' grade. At least, with SPF,  
> the spammer must forge an address on the hacked domain, which increases  
> the likelihood of detection

Yes.  I would blacklist domains that "pass" hacked servers.  Just as IPs of
hacked servers are blacklisted.  They're sending spam, and need to be
fixed.

>> Forwarding doesn't break.
>
> Ah, so you want to allow 'legitimate' forwarding, but not allow spammers  
> to 'forward' their mail? Good luck with that. The only way to make it 
> work for the legitimate sender, but not for spammers is to have a 
> mechanism built-in to the forwarding server that encapsulates or rewrites 
> the envelope 'From' address.

Encapsulating or rewriting the envelope 'From' address seems significantly
less likely to be adopted from what I've read.

>> Obviously you'd need a blacklist of spammer domains that list spamming
>> IPs as legit senders.
>
> And you would be playing the same 'musical chairs' game with new domains  
> created by spammers on a daily basis. All the same flaws of SPF, and no  
> greater benefit.

Same domain blacklisting issues as SPF, yes.  

I am not very concerned about the throw-away domains because
I'll reject all mail from domains not at least 10 days old.  10+
day old domains are already listed as 127.0.2.3 records from
example.com.hostkarma.junkemailfilter.com.

I believe the benefit of not breaking forwarding is sufficient to make it
much more useful than SPF for spam filtering.  I've come across enough
people, personally, recently, in trying to block (some = positive SA
score) emails without an SPF "pass", who are not willing to ever implement
SPF due to breaking forwarding that I believe this would be useful.

>> Is there any way this wouldn't be very useful?
>
> Is there any place where SPF does not do the same job, other than mail  
> forwarding?

No.  But as I said, I am concerned about the potential for wide spread
adoption of SPF due to forwarding breakage enough that I think this would
be much more useful.


On 02/09, Matus UHLAR - fantomas wrote:
> On 08.02.10 22:08, dar...@chaosreigns.com wrote:
> > So it's not tied to the SMTP MAIL FROM or anything.
> > Forwarding doesn't break.
> 
> What do you mean by this?
> Do you want to implement new way of defining which hosts are permitted to
> send e-mail? 

Yes.

> There already are attempts to do this, with false positives and
> negatives. 

How is this not better than the other attempts?

> Yours is a bit complicated

How is it complicat

Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Charles Gregory

On Mon, 2010-02-08 at 22:08 -0500, dar...@chaosreigns.com wrote:

You get an email delivered from 64.71.152.40 (last untrusted
relay).  You look up the DNS A record for that IP, and get
mail.chaosreigns.com.


That's a PTR lookup, but let's press on

Then you look up the DNS PTR record of 
40.152.71.64.designatedsender.mail.chaosreigns.com, and if it's 
127.0.0.1, it's a legit email sender and gets some negative SA score.


What you describe here is functionally similar to an SPF lookup with a 
'pass' result. The server provides positive verification 
that the listed IP is a legitimate sender for that domain.


Otherwise it's not, and gets some positive SA score (low at first until 
adoption spreads).


As long as 'otherwise' is a definitive 'fail' response from an SPF (or 
equivalent) server, and not merely an absence of SPF server



So it's not tied to the SMTP MAIL FROM or anything.


Your method would allow 'spoofing' so that a spammer who hacks a 
legitimate server can use a valid return address on a different domain, 
but still the mail would receive a 'passing' grade. At least, with SPF, 
the spammer must forge an address on the hacked domain, which increases 
the likelihood of detection



Forwarding doesn't break.


Ah, so you want to allow 'legitimate' forwarding, but not allow spammers 
to 'forward' their mail? Good luck with that. The only way to make it work 
for the legitimate sender, but not for spammers is to have a mechanism 
built-in to the forwarding server that encapsulates or rewrites the 
envelope 'From' address.



Eventually you reject all email from IPs without such records.


In a perfect world.


Obviously you'd need a blacklist of spammer domains that list spamming
IPs as legit senders.


And you would be playing the same 'musical chairs' game with new domains 
created by spammers on a daily basis. All the same flaws of SPF, and no 
greater benefit.



Is there any way this wouldn't be very useful?


Is there any place where SPF does not do the same job, other than mail 
forwarding?


- Charles


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread RW
On Mon, 8 Feb 2010 22:08:10 -0500
dar...@chaosreigns.com wrote:

> You get an email delivered from 64.71.152.40 (last untrusted
> relay).  You look up the DNS A record for that IP, and get
> mail.chaosreigns.com.  Then you look up the DNS PTR record of
> 40.152.71.64.designatedsender.mail.chaosreigns.com, and if it's
> 127.0.0.1, it's a legit email sender and gets some negative SA score.
> Otherwise it's not, and gets some positive SA score (low at first
> until adoption spreads).

You've mixed-up A record and PTR record. 

Checking for full-circle DNS already does most of this. What your
scheme would do is check for otherwise legitimate servers that have
been compromised and are delivering direct-to-mx. 


Re: Spam filtering similar to SPF, less breakage

2010-02-09 Thread Matus UHLAR - fantomas
On 08.02.10 22:08, dar...@chaosreigns.com wrote:
> You get an email delivered from 64.71.152.40 (last untrusted
> relay).  You look up the DNS A record for that IP, and get

You won't look up A records for an IP, IP address do NOT have A records.
You can look up PTR (or any other record) for 40.152.71.64.in-addr.arpa.

> mail.chaosreigns.com.  Then you look up the DNS PTR record of
> 40.152.71.64.designatedsender.mail.chaosreigns.com, and if it's
> 127.0.0.1, it's a legit email sender and gets some negative SA score.

Then I will look A record of mail.chaosreigns.com and see if it's
64.71.152.40.

If you compare these two, you see that I need to control the same domains no
matter which wsay I go. Just now I can do what you propose (and many
spammers can too) but that doesn't mean my mail is legitimate.

> Otherwise it's not, and gets some positive SA score (low at first until
> adoption spreads).
> 
> So it's not tied to the SMTP MAIL FROM or anything.
> Forwarding doesn't break.

What do you mean by this?
Do you want to implement new way of defining which hosts are permitted to
send e-mail? There already are attempts to do this, with false positives and
negatives. Yours is a bit complicated and new which means everyone would
need to implement this (otherwise he'd get false positives on his outgoing
mail). Therefore I think it won't work this way.
If you want to implement new way of defining which hosts are permitted to
send e-mail from which domain, the same applies.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"They say when you play that M$ CD backward you can hear satanic messages."
"That's nothing. If you play it forward it will install Windows."


Re: Spam filtering similar to SPF, less breakage

2010-02-08 Thread Per Jessen
ram wrote:

> Apparently you want to check if non mail servers are sending mails ..
> but what percentage of spams today come from non mail servers ?

The vast majority, I would say.


/Per Jessen, Zürich



Re: Spam filtering similar to SPF, less breakage

2010-02-08 Thread ram

On Mon, 2010-02-08 at 22:08 -0500, dar...@chaosreigns.com wrote:
> You get an email delivered from 64.71.152.40 (last untrusted
> relay).  You look up the DNS A record for that IP, and get
> mail.chaosreigns.com.  Then you look up the DNS PTR record of
> 40.152.71.64.designatedsender.mail.chaosreigns.com, and if it's
> 127.0.0.1, it's a legit email sender and gets some negative SA score.
> Otherwise it's not, and gets some positive SA score (low at first until
> adoption spreads).
> 
> So it's not tied to the SMTP MAIL FROM or anything.
> Forwarding doesn't break.
> 
> Eventually you reject all email from IPs without such records.
> 
> Obviously you'd need a blacklist of spammer domains that list spamming
> IPs as legit senders.  Not an RHSBL / MAIL FROM blacklist, but a blacklist
> where, when the A record of a delivering IP is in a blacklisted domain, the
> mail gets rejected.
> 
> I am not at all attached to the format of the PTR record and would
> like suggestions.
> 
> 
> Is there any way this wouldn't be very useful?
> 

Apparently you want to check if non mail servers are sending mails ..
but what percentage of spams today come from non mail servers ?