On Sun, Jun 29, 2008 at 04:17:38PM -0700, Tony Cratz wrote:
> Larry Ozeran wrote:
> > Hi,
> > 
> > I have used a web host based in North Carolina for many years. I recently 
> > upgraded from a shared server to a dedicated server and I was hoping to be 
> > able to install some SPAM fighting tools. The SPAM software they provide is 
> > limited to white listing and black listing and I am now receiving huge 
> > volumes of it. I am a part time programmer, not familiar with networks or 
> > email servers, but I am tired of huge volumes of SPAM. I reviewed various 
> > sites and felt that installing postgrey might give me substantial SPAM 
> > reduction with minimal challenges. When I asked my host about installing 
> > it, I was told:
> > "After further investigation I was able to verify that the request was 
> > denied.
> > It was specified that this software would be unsafe to run on the server 
> > environments run within our network.
> > This is per our Systems Administrators."
> > 
> > After going around with them twice, I don't have what I feel is an adequate 
> > answer. Any thoughts on why someone might think that postgrey is "unsafe"? 
> > Better yet, any strategies for countering this thinking?
> > 
> >  = = system info - yes the versions are old, but that's not my host's 
> > excuse for the denial and they can be updated now that I am on a dedicated 
> > server
> > Operating System:   Redhat Linux Kernel Version:    2.4.26
> > Apache/PHP Version:         Apache/1.3.34 (Unix) filter/1.0 PHP/4.4.4
> > Perl Version:       v5.6.0
> > MySQL Version:      3.23.33
> > Send Mail Version:  8.12.10
> > 
> > Thanks for any suggestions or clarifications.
> 
> 
>       I did a could of quick searches and found a couple of things.
>       There was a security DoS (Denial of Service) issue in the 2006
>       time frame using Postgray 1.21. On Debian systems there was a
>       patch which fixed the problem (I did not see any patch for
>       Red Hat).
> 
>       The current version of Postgrey is 1.31 with a timestamp of
>       9/2007.
> 
>       With the above it would be a good chance the DoS issue has
>       been solved.
> 
>       Now lets quickly take a look at how Postgrey works. If the
>       message the SMTP server receive is the first connection of
>       a message it is TEMPFAIL rejected (meaning it must be attempted
>       to send again before the message is accepted).
> 
>       Now one might ask why do this? At one time some of the spammers
>       would only attempt to send a message once and if they received
>       a TEMPFAIL they would drop the message, thus reducing the
>       amount of SPAM a site might received from a spammer.
> 
>       PLEASE NOTE: This was before the use of zombie networks. Now
>       they have the zombies send the message and they don't care if
>       the zombies have a TEMPFAIL as the message is not sitting on
>       the spammer machine but maybe on the zombie system but more
>       likely it is setting on the ISP of the witless user of the
>       zombie system.
> 
>       So the bottom line is, using Postgrey now is just a waste of
>       computer resources and time. As fir it currently being a
>       security issue, I can't find anything to suggest this is
>       still true. But your ISP may be using it as an excuse to
>       not waste their time setting it up, or they may not be using
>       Postfix (which is required for Postgrey). They could be using
>       Sendmail, Qmail or Exim.
> 
>       Is there better solutions? I know a lot of people are using
>       mimedefang + SpamAssassin + ClamAV to reduce the amount of
>       SPAM and viruses. Can you stop all SPAM using these methods?
>       NO. Can you reduce the SPAM yes. Are there other things which
>       can be done also? Yes you can use DNS blacklist such as
>       Spamhaus and SpamCop. Again these only help to reduce the
>       SPAM.
> 
> 
>       The only way to possible stop SPAM is to rewrite all of the
>       RFC dealing with mail and require each clients to certify who
>       they are so the true path can not be hidden and the spammers
>       could be trace. Note: This really would not fully solve the
>       problem but would allow the message to be traced back to the
>       zombie system a lot faster. But zombie networks could still be
>       used. It would just require a new one to be set-up which would
>       take time. I also make note of a news article from last year
>       (sorry I don't have the link any more) where a System installer
>       who worked out of the US setting up systems for the customers
>       of the company he worked for (kind of like the Geek Squad of
>       Best Buy) where he installed the software to turn the systems
>       into zombie servers.

I am using sa-exim which supports greylisting. I also received about 500
spams where the spammer used guestbooks and e-card sites, feedback
forms, and whatever they could post to to send me the spam. I am willing
to be they used Google to harvest the sites with these services, put
together some bots to activate the guestbooks, e-cards, feedback form
sites that send replies to the client using the page, and then activated
them all at once. I still have the spams, so I can harvest the IPs of
the relaying servers and perhaps just block their servers. 

One way to completely block SPAM is to use TLS / SSL and allow only
authenticated mail servers to relay into your mail server. 

brian
-- 
Brian Lavender
http://www.brie.com/brian/
_______________________________________________
vox-tech mailing list
vox-tech@lists.lugod.org
http://lists.lugod.org/mailman/listinfo/vox-tech

Reply via email to