Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-27 Thread Kai Schaetzl
Mr. List Mail User, your efforts in this respect are ridiculous, now 
your are resurrecting long dead bodies. I can't believe that you read this 
document and still believe it could have any relevance to this. Wow.

1. this is what rfc-editor.org says about 954:
RFC0954
 NICNAME/WHOIS  K. Harrenstien, M.K. Stahl, E.J. Feinler October 1985 
ASCII Obsoletes RFC812, Obsoleted by RFC3912  DRAFT STANDARD 
That's pretty clear, isn't? It's obsoleted.

2. Be it obsoleted or not, there is nothing in that document that puts 
whois.denic.de in violation of it. I really suggest you ask someone to 
explain it to you. Maybe you are reading a different document, I use this 
one: ftp://ftp.rfc-editor.org/in-notes/rfc954.txt


Kai

-- 
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conactive.com





Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-26 Thread List Mail User
...
On Thursday 25 May 2006 21:31, Kai Schaetzl took the opportunity to write:
 Jamie L. Penman-Smithson wrote on Thu, 25 May 2006 17:12:07 +0100:
  .de does not have a working WHOIS server, that's fundamentally broken:

 No, *your* whois client is outdated and broken.

 snip

 And this is not the only TLD they are wrong about. If you want to
 follow-up, better to me directly, I think it's off-topic.

You should have explained why they where wrong from the beginning. You're=20
absolutely right. The RFC doesn't define any syntax. The evidence is totall=
y=20
bogus.

=2D-=20
Magnus Holmgren[EMAIL PROTECTED]
   (No Cc of list mail needed, thanks)
...

Um...  Syntax?

RFC3912 Section 3

3.  Protocol Example

   If one places a request of the WHOIS server located at whois.nic.mil
   for information about Smith, the packets on the wire will look
   like:

   client   server at whois.nic.mil

   open TCP    (SYN) --
   (SYN+ACK) -
   send query  SmithCRLF 
   get answer  Info about SmithCRLF -
   More info about SmithCRLF 
   close   (FIN) --
  - (FIN) -



DeNIC does not follow this protocol;  However for many (even most)
domains, proper data can be gotten using *undocumented* extensions they
have added to their own Whois server.  A large number of whois clients do
special case the DeNIC and .de domains, but this only shows that the .de
TLD is indeed *not* RFC compliant.

Please examine the source of any not outdated and broken client
and look at the code, or better look at (previous listing):

http://www.rfc-ignorant.org/tools/detail.php?domain=desubmitted=1094941143table=whois

BTW. The many common clients use the ISO-8859-1 character set, which only
works for a subset of the domains at DeNIC - so please don't count any of
these as not broken (and US-ASCII still doesn't work for all domains
either - just nearly all).

Oh, and for clients that follow referrals to HTTP servers (which
many country specific NICs do provide in place of Whois servers), we have:

RFC3912 Section 2

2.  Protocol Specification

   A WHOIS server listens on TCP port 43 for requests from WHOIS
   clients.  The WHOIS client makes a text request to the WHOIS server,
   then the WHOIS server replies with text content.  All requests are
   terminated with ASCII CR and then ASCII LF.  The response might
   contain more than one line of text, so the presence of ASCII CR or
   ASCII LF characters does not indicate the end of the response.  The
   WHOIS server closes its connection as soon as the output is finished.
   The closed TCP connection is the indication to the client that the
   response has been received.


Simply, if it isn't plain text on port 43, it isn't a RFC compliant Whois 
server.  Oh, and if anyone knows of an IANA registered Whois server for a
TLD that does function (I know of several which work, but aren't listed
at IANA), then an email to RFCI will get a listing removed.

Paul Shupak
[EMAIL PROTECTED]


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-26 Thread Kai Schaetzl
List Mail User wrote on Thu, 25 May 2006 23:02:21 -0700 (PDT):

 DeNIC does not follow this protocol; 

1. there's nothing which backs your claim, *nothing*.
2. example is an example and nothing else. You should know that. There are 
also special 
words in RFCs which clearly define mandatory things. What you claim is a wish, 
it's not 
defined by that RFC. There is nothing in that RFC that defines a *required* 
syntax other 
than terminating the one-line query. There is *nothing* in that RFC that 
*requires* a 
certain output volume or content volume, just that you get some text about the 
queried 
object back.

 BTW. The many common clients use the ISO-8859-1 character set, which only 
 works for a subset of the domains at DeNIC - so please don't count any of 
 these as not broken (and US-ASCII still doesn't work for all domains 
 either - just nearly all). 

What's the problem with this? Non-ISO-8859-1 text isn't text? Is that what you 
want to 
say? Think about that again.

 Oh, and for clients that follow referrals to HTTP servers (which 
 many country specific NICs do provide in place of Whois servers), we have: 

 Simply, if it isn't plain text on port 43, it isn't a RFC compliant Whois 
 server.

You are making up your own rules, again. There's nothing in the text you quoted 
that 
requires plain text (whatever you mean by that) and disallows referrals.

Kai

-- 
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conactive.com





Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-26 Thread Magnus Holmgren
On Friday 26 May 2006 15:53, List Mail User took the opportunity to write:

   Kai,

   There doesn't seem to be any language barrier, so either you refuse
 to read and follow the RFC trail yourself, or you require spoon-feeding.

   What about RFC1032, page 5
 
 VERIFICATION OF DATA

The verification process can be accomplished in several ways.  One of
these is through the NIC WHOIS server.  If he has access to WHOIS,
the DA can type the commmand whois domain domain namereturn.
The reply from WHOIS will supply the following: the name and address
of the organization owning the domain; the name of the domain; its
administrative, technical, and zone contacts; the host names and
network addresses of sites providing name service for the domain.

Judging from the title, RFC 1032 is a guide, not a normative reference. 
AFAICT, the section above describes how to use a specific WHOIS server, or 
rather *the* WHOIS server, which existed at the Network Information Center 
(NIC) of Defense Data Network (DDN) at the time.

-- 
Magnus Holmgren[EMAIL PROTECTED]
   (No Cc of list mail needed, thanks)


pgpBifFmc43gX.pgp
Description: PGP signature


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-26 Thread Kai Schaetzl
List Mail User wrote on Fri, 26 May 2006 06:53:36 -0700 (PDT):

 What about RFC1032, page 5 

RFC 1032 is not authoritative in any way. It never was a standard, it doesn't 
define anything about the whois protocol. If you think so it's wishful thinking.

 This RFC is not obsolete, and make quite clear that indeed certain 
 data is required.  RFC3912 greatly reduces the requirements from what was 
 in RFC954, but *some* means of contact remains required, as does an identity 
 of the registrant (any of a person, organization or agent will suffice). 

There's nothing in RFC 3912 about this. Whatever you are reading, it's not 3912.
I asked the author of RFC 3912 and he clearly says that the .de whois server is 
*not* in violation of RFC 3912 in his opinion. He says the output could be 
considered suboptimal. Do you really want me to contact the author of 1032 as 
well? I suggest *you* do that if you want to keep backing your claims with 
1032. 
Until that: forget about 1032.

I also think you confuse protocol and query syntax. None of the quoted RFCs 
specifies a certain query syntax.


Kai

-- 
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conactive.com





Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-26 Thread Pablo Allietti
On Fri, May 26, 2006 at 02:31:16PM +0200, Kai Schaetzl wrote:
 Jamie L. Penman-Smithson wrote on Fri, 26 May 2006 00:52:39 +0100:
 
  After some research, I came to the conclusion that .de is, indeed,   
  still broken: 
   
  ftp://ftp.isi.edu/in-notes/rfc3912.txt
 
 And *where exactly* does this RFC say that the whois input and output must 
 behave in a different way than the .de input and output does now?
 
 Kai
 
 -- 
 Kai Schätzl, Berlin, Germany
 Get your web at Conactive Internet Services: http://www.conactive.com
 
 
---end quoted text---

-- 


.-
Pablo Allietti
E-mail: [EMAIL PROTECTED] | LACNIC  

  
Phone : +598 2 604   | http://LACNIC.NET


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-26 Thread jdow

From: Kai Schaetzl [EMAIL PROTECTED]


Jamie L. Penman-Smithson wrote on Fri, 26 May 2006 00:52:39 +0100:

After some research, I came to the conclusion that .de is, indeed,   
still broken: 
 
ftp://ftp.isi.edu/in-notes/rfc3912.txt


And *where exactly* does this RFC say that the whois input and output must 
behave in a different way than the .de input and output does now?


Kai


More to the point, Kai, in line with my earlier comment that RFCs are
Request For Comment documents not standards, where does ANYTHING say
that ANYONE MUST abide by them as if they were standards?

Of course, NOTHING says a particular anti-spam tool cannot decide to
use the formalisms from an RFC to build a filter mechanism, either. The
RFCs are good things. They just are not mandatory things, yet.

{^_-}


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-26 Thread List Mail User
...
From: Kai Schaetzl [EMAIL PROTECTED]

 Jamie L. Penman-Smithson wrote on Fri, 26 May 2006 00:52:39 +0100:
 
 After some research, I came to the conclusion that .de is, indeed,   
 still broken: 
  
 ftp://ftp.isi.edu/in-notes/rfc3912.txt
 
 And *where exactly* does this RFC say that the whois input and output must 
 behave in a different way than the .de input and output does now?
 
 Kai

More to the point, Kai, in line with my earlier comment that RFCs are
Request For Comment documents not standards, where does ANYTHING say
that ANYONE MUST abide by them as if they were standards?

Of course, NOTHING says a particular anti-spam tool cannot decide to
use the formalisms from an RFC to build a filter mechanism, either. The
RFCs are good things. They just are not mandatory things, yet.

{^_-}


Actually Joanne, there is STD-1, which is exactly those RFCs which
have been adopted as standards (i.e. it is too late to make any comments
on their content).  Though Kai won't like these - they *still* contain RFC954,
not RFC3912 and by that requirement DeNIC is completely in violation;  RFC954
basically reads like a portion of the ICANN registrars agreement which governs
unsponsored TLDs - i.e. .aero, .arpa, .biz, .cat, .com, .coop, .edu, .info,
.int, .jobs, .mobi, .museum, .name, .net, .org, .pro, and .travel.

See:

http://rfc.net/std1.html

Of course, STD-1 is itself an RFC:)  But the last accepted standard
for Whois is RFC954, everything later is largly attempts by DeNIC (and Chile)
to remove Whois entirely (and their lastest proposal is to do exactly that).
(Though it is clear that RFC3912 *will* become the standard in some later
version of STD-1 - but it isn't *yet*.)

Still none of any of these has the weight of law behind them except
for possibly the contractual element of the ICANN registrars agreement (but
ICANN has never really tried to do much to enforce that for most ill-behaving
registrars) and that would be civil law, not criminal;  There are no net
police except the self-appointed ones (like every admin who uses a blacklist,
firewall blocks or even SA).

Paul Shupak
[EMAIL PROTECTED]


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Kai Schaetzl
Mike Jackson wrote on Wed, 24 May 2006 08:44:17 -0700:

 Personally, I have those two rules zero-scored in my local.cf. Even though I 
 like RFCI, and use their bogusmx and dsn lists at the MTA level, these two 
 create too many false positives.

You cannot trust any of the rfc-ignorant.org lists, they list whole TLDs just 
because they don't like something about them. These lists go by personal 
taste than any other.

http://www.rfc-ignorant.org/tools/lookup.php?domain=something.de


Kai

-- 
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conactive.com





Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Magnus Holmgren
On Thursday 25 May 2006 17:31, Kai Schaetzl took the opportunity to write:
 Mike Jackson wrote on Wed, 24 May 2006 08:44:17 -0700:
  Personally, I have those two rules zero-scored in my local.cf. Even
  though I like RFCI, and use their bogusmx and dsn lists at the MTA level,
  these two create too many false positives.

 You cannot trust any of the rfc-ignorant.org lists, they list whole TLDs
 just because they don't like something about them. These lists go by
 personal taste than any other.

[...], however 'entire TLD'-based domains return a different result code in 
the A record (127.0.0.7 versus 127.0.0.5) so as to allow sites to 
differentiate between them., which SA takes into account.

(http://www.rfc-ignorant.org/policy-whois.php)

-- 
Magnus Holmgren[EMAIL PROTECTED]
   (No Cc of list mail needed, thanks)


pgp8dmCqB4lD9.pgp
Description: PGP signature


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Mike Jackson
Personally, I have those two rules zero-scored in my local.cf. Even 
though I
like RFCI, and use their bogusmx and dsn lists at the MTA level, these 
two

create too many false positives.


You cannot trust any of the rfc-ignorant.org lists, they list whole TLDs 
just

because they don't like something about them. These lists go by personal
taste than any other.

http://www.rfc-ignorant.org/tools/lookup.php?domain=something.de


Some of their listings are arbitrary, but the two I listed are based on 
solid, indisputable configuration problems that are either the sign of a 
clueless administrator or malicious intent, mostly the latter. I find their 
false positive rate to be nearly zero, and I trust them to block unwated 
mail before it arrives. The only - repeat, only - false positive I've seen 
in several years of usage was the bogusmx listing here:


http://www.rfc-ignorant.org/tools/lookup.php?full=1domain=guardnet%2Ecom

In that case, it was a clueless admin, but since I knew them personally, I 
explained the problem and told them how to fix it. 



Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Jamie L. Penman-Smithson


On 25 May 2006, at 16:31, Kai Schaetzl wrote:


Mike Jackson wrote on Wed, 24 May 2006 08:44:17 -0700:
Personally, I have those two rules zero-scored in my local.cf.  
Even though I
like RFCI, and use their bogusmx and dsn lists at the MTA level,  
these two

create too many false positives.


You cannot trust any of the rfc-ignorant.org lists, they list whole  
TLDs just
because they don't like something about them. These lists go by  
personal

taste than any other.

http://www.rfc-ignorant.org/tools/lookup.php?domain=something.de


.de does not have a working WHOIS server, that's fundamentally broken:

[Querying whois.denic.de]
[whois.denic.de]
Domain:  something.de
Status:  connect

-j


PGP.sig
Description: This is a digitally signed message part


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Kai Schaetzl
Jamie L. Penman-Smithson wrote on Thu, 25 May 2006 17:12:07 +0100:

 .de does not have a working WHOIS server, that's fundamentally broken:

No, *your* whois client is outdated and broken.

 whois something.de
 [Querying whois.denic.de]
 [whois.denic.de]
 % Copyright (c)2004 by DENIC
 % Version: 1.05.0
 %
 % Restricted rights.
 %
 %
 % Except for agreed Internet operational purposes, no part of this
 % information may be reproduced, stored in a retrieval system, or
 % transmitted, in any form or by any means, electronic, mechanical,
 % recording, or otherwise, without prior permission of the DENIC
 % on behalf of itself and/or the copyright holders. Any use of this
 % material to target advertising or similar activities are explicitly
 % forbidden and will be prosecuted. The DENIC requests to be notified
 % of any such activities or suspicions thereof.
 
 Domain:  something.de
 Domain-Ace:  something.de
 Descr:   Michael Blatz
 Descr:   Pfarrgartenstr. 18
 Descr:   D-65719 Hofheim
 Descr:   Germany

snip

And this is not the only TLD they are wrong about. If you want to 
follow-up, better to me directly, I think it's off-topic.

Kai

-- 
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conactive.com





Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Kai Schaetzl
Magnus Holmgren wrote on Thu, 25 May 2006 18:01:19 +0200:

 [...], however 'entire TLD'-based domains return a different result code in 
 the A record (127.0.0.7 versus 127.0.0.5) so as to allow sites to 
 differentiate between them.

That is not of interest at all. The problem is they list TLDs because of rules 
they make up themselves, but pretend they use RFCs. If they want to list 
whatever they like: fine. But then they shouldn't claim it's in concordance 
with an RFC while it's not. That's simply a lie. At the moment I know of at 
least three TLDs they list this way, there are probably more.

If you want to follow-up, better to me directly, I think it's off-topic.

Kai

-- 
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conactive.com





Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Benny Pedersen

 You cannot trust any of the rfc-ignorant.org lists, they list whole TLDs just
 because they don't like something about them. These lists go by personal 
 taste than any other.

 http://www.rfc-ignorant.org/tools/lookup.php?domain=something.de

http://www.rfc-ignorant.org/policy-whois.php





Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Magnus Holmgren
On Thursday 25 May 2006 21:31, Kai Schaetzl took the opportunity to write:
 Jamie L. Penman-Smithson wrote on Thu, 25 May 2006 17:12:07 +0100:
  .de does not have a working WHOIS server, that's fundamentally broken:

 No, *your* whois client is outdated and broken.

 snip

 And this is not the only TLD they are wrong about. If you want to
 follow-up, better to me directly, I think it's off-topic.

You should have explained why they where wrong from the beginning. You're 
absolutely right. The RFC doesn't define any syntax. The evidence is totally 
bogus.

-- 
Magnus Holmgren[EMAIL PROTECTED]
   (No Cc of list mail needed, thanks)


pgp2zjw828ru7.pgp
Description: PGP signature


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Jamie L. Penman-Smithson


On 25 May 2006, at 20:31, Kai Schaetzl wrote:

Jamie L. Penman-Smithson wrote on Thu, 25 May 2006 17:12:07 +0100:
.de does not have a working WHOIS server, that's fundamentally  
broken:


No, *your* whois client is outdated and broken.


Agreed, it works in a later version.

snip

And this is not the only TLD they are wrong about. If you want to
follow-up, better to me directly, I think it's off-topic.


If you think a listing is incorrect either contact RFCi, or raise it  
the RFCi mailing list.


Complaining about it does nothing.

-j


PGP.sig
Description: This is a digitally signed message part


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Jamie L. Penman-Smithson


On 25 May 2006, at 21:54, Magnus Holmgren wrote:
On Thursday 25 May 2006 21:31, Kai Schaetzl took the opportunity to  
write:

Jamie L. Penman-Smithson wrote on Thu, 25 May 2006 17:12:07 +0100:
.de does not have a working WHOIS server, that's fundamentally  
broken:


No, *your* whois client is outdated and broken.

snip

And this is not the only TLD they are wrong about. If you want to
follow-up, better to me directly, I think it's off-topic.


You should have explained why they where wrong from the beginning.  
You're
absolutely right. The RFC doesn't define any syntax. The evidence  
is totally

bogus.


No, RFC 1932 defines the WHOIS protocol, including the syntax.

After some research, I came to the conclusion that .de is, indeed,  
still broken:


ftp://ftp.isi.edu/in-notes/rfc3912.txt

2.  Protocol Specification

   A WHOIS server listens on TCP port 43 for requests from WHOIS
   clients.  The WHOIS client makes a text request to the WHOIS server,
   then the WHOIS server replies with text content.  All requests are
   terminated with ASCII CR and then ASCII LF.  The response might
   contain more than one line of text, so the presence of ASCII CR or
   ASCII LF characters does not indicate the end of the response.  The
   WHOIS server closes its connection as soon as the output is  
finished.

   The closed TCP connection is the indication to the client that the
   response has been received.

3.  Protocol Example

   If one places a request of the WHOIS server located at whois.nic.mil
   for information about Smith, the packets on the wire will look
   like:

   client   server at whois.nic.mil

   open TCP    (SYN) --
   (SYN+ACK) -
   send query  SmithCRLF 
   get answer  Info about SmithCRLF -
   More info about SmithCRLF 
   close   (FIN) --
  - (FIN) -

Working WHOIS server:

$ telnet whois.iana.org 43
Trying 192.0.34.118...
Connected to whois.iana.org.
Escape character is '^]'.
example.net

IANA Whois Service
Domain: example.net
Name: IANA_RESERVED

Registrant:
Name: Internet Assigned Numbers Authority (IANA)
Organization: Internet Assigned Numbers Authority (IANA)
Address1: 4676 Admiralty Way, Suite 330
[..]

Broken WHOIS server:

$ telnet whois.denic.de 43
Trying 81.91.162.8...
Connected to whois.denic.de.
Escape character is '^]'.
something.de
Domain:  something.de
Status:  connect

Connection closed by foreign host.

The WHOIS server for .de is not RFC compliant, therefore it is and  
should be listed until it is RFC compliant. Whether some whois  
clients decide to cater to whatever broken syntax .de has decided to  
use is immaterial.


-j


PGP.sig
Description: This is a digitally signed message part


RE: false scoring for DNS_FROM_RFC_ABUSE

2006-05-25 Thread Matthew.van.Eerde
Jamie L. Penman-Smithson wrote:
 
(RFC)
 open TCP    (SYN) --
 (SYN+ACK) -
 send query  SmithCRLF 
 get answer  Info about SmithCRLF -
 More info about SmithCRLF 
 close   (FIN) --
- (FIN) -
  
 Working WHOIS server:
 
 $ telnet whois.iana.org 43
 Trying 192.0.34.118...
 Connected to whois.iana.org.
 Escape character is '^]'.
 example.net
 
 IANA Whois Service
 Domain: example.net
 Name: IANA_RESERVED
 
 Registrant:
  Name: Internet Assigned Numbers Authority (IANA)
  Organization: Internet Assigned Numbers Authority (IANA)
  Address1: 4676 Admiralty Way, Suite 330
 [..]
 
 Broken WHOIS server:
 
 $ telnet whois.denic.de 43
 Trying 81.91.162.8...
 Connected to whois.denic.de.
 Escape character is '^]'.
 something.de
 Domain:  something.de
 Status:  connect
 
 Connection closed by foreign host.
 
 The WHOIS server for .de is not RFC compliant

I agree

 Whether some whois clients decide to cater to whatever broken syntax
.de has decided to
 use is immaterial.

I agree here too

-- 
Matthew.van.Eerde (at) hbinc.com   805.964.4554 x902
Hispanic Business Inc./HireDiversity.com   Software Engineer


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-24 Thread John Rudd


On May 24, 2006, at 3:01 AM, [EMAIL PROTECTED] wrote:

Event though hotmail.com domain has a abuse address and a postmaster 
address, why do mails from hotmail.com domain get

trigerred for these tests

0.4 DNS_FROM_RFC_ABUSE
1.4 DNS_FROM_RFC_POST


I believe the requirement is not just that the addresses exist, but 
that they actually get read by a human.  I think hotmail doesn't do 
this.




RE: false scoring for DNS_FROM_RFC_ABUSE

2006-05-24 Thread Sietse van Zanen
Because Hotmail is NOTmail.
 
Hotmail (Microsofties), does not reply to abuse and postmaster mails. That's is 
against RFC, not nice, anti-social etc. etc.
Therefor hotmail, as the same with yahoo is SPAM by default. Some mail server 
admins even block mail coming from there by default.
 
-Sietse



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wed 24-May-06 12:01
To: users@spamassassin.apache.org
Subject: false scoring for DNS_FROM_RFC_ABUSE






Event though hotmail.com domain has a abuse address and a postmaster
address, why do mails from hotmail.com domain get
trigerred for these tests

0.4 DNS_FROM_RFC_ABUSE
1.4 DNS_FROM_RFC_POST




Regards
Padma
ERNET Helpdesk




Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-24 Thread Mike Jackson
Event though hotmail.com domain has a abuse address and a postmaster 
address, why do mails from hotmail.com domain get

trigerred for these tests

0.4 DNS_FROM_RFC_ABUSE
1.4 DNS_FROM_RFC_POST


Because it's listed on both of those lists at rfc-ignorant.org:

http://www.rfc-ignorant.org/tools/lookup.php?full=1domain=hotmail%2Ecom

Basically, even though the addresses are active, they spam-filter them, 
making their use almost pointless.


Personally, I have those two rules zero-scored in my local.cf. Even though I 
like RFCI, and use their bogusmx and dsn lists at the MTA level, these two 
create too many false positives. 



RE: false scoring for DNS_FROM_RFC_ABUSE

2006-05-24 Thread padma


Thnks for the info!



On Wed, 24 May 2006, Sietse van Zanen wrote:


Because Hotmail is NOTmail.

Hotmail (Microsofties), does not reply to abuse and postmaster mails. That's is 
against RFC, not nice, anti-social etc. etc.
Therefor hotmail, as the same with yahoo is SPAM by default. Some mail server 
admins even block mail coming from there by default.

-Sietse



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wed 24-May-06 12:01
To: users@spamassassin.apache.org
Subject: false scoring for DNS_FROM_RFC_ABUSE






Event though hotmail.com domain has a abuse address and a postmaster
address, why do mails from hotmail.com domain get
trigerred for these tests

0.4 DNS_FROM_RFC_ABUSE
1.4 DNS_FROM_RFC_POST




Regards
Padma
ERNET Helpdesk





--








Regards
Padma
ERNET Helpdesk


Re: false scoring for DNS_FROM_RFC_ABUSE

2006-05-24 Thread padma


that info was indeed good!



On Wed, 24 May 2006, Mike Jackson wrote:

Event though hotmail.com domain has a abuse address and a postmaster 
address, why do mails from hotmail.com domain get

trigerred for these tests

0.4 DNS_FROM_RFC_ABUSE
1.4 DNS_FROM_RFC_POST


Because it's listed on both of those lists at rfc-ignorant.org:

http://www.rfc-ignorant.org/tools/lookup.php?full=1domain=hotmail%2Ecom

Basically, even though the addresses are active, they spam-filter them, 
making their use almost pointless.


Personally, I have those two rules zero-scored in my local.cf. Even though I 
like RFCI, and use their bogusmx and dsn lists at the MTA level, these two 
create too many false positives.


--








Regards
Padma
ERNET Helpdesk


false scoring for DNS_FROM_RFC_ABUSE

2006-05-23 Thread padma




Event though hotmail.com domain has a abuse address and a postmaster 
address, why do mails from hotmail.com domain get

trigerred for these tests

0.4 DNS_FROM_RFC_ABUSE
1.4 DNS_FROM_RFC_POST




Regards
Padma
ERNET Helpdesk