Davide - sorry to continue this OT here, but perhaps others might be 
interested...
At 10:27 12/29/2003, Kirk Friggstad wrote:

>If I may jump in here with a comment on your spam-blocking method...
>
>We've just been through hell with an ISP who uses a similar blocking scheme
>(blocking IP addresses in the headers of reported spam messages). We have a
>forwarding mail account set up for one of our out-of-office sales reps -
>[EMAIL PROTECTED] forwarding to [EMAIL PROTECTED] (obviously, names
>have been changed). Our sales rep had spam sent to the
>[EMAIL PROTECTED], and proceeded to report it to hisISP.net. hisISP.net
>then blocked all messages sent through our mail server, which effectively
>cut us out of any communication with our sales rep.
>
>After about a week's worth of phone calls between our rep, our tech guys,
>and hisISP.net, we managed to get our server "whitelisted" at hisISP.net -
>although our whitelist entry apparently disappeared a few days later, and we
>had to do the whole thing again to get back into the whitelist.
>
>The point of this story - the collateral damage of this type of blocking
>scheme may outweigh it's effectiveness. Not saying that it will in your
>case, but just something to keep in mind.

Not to be obstinate or anything, but you really don't know anything about 
my blocking methods here...

Let me explain to you how things work here. I have a number of email 
addresses which are "spam-traps". These addresses were used about 3 years 
ago for various things, then disabled (all mail to these addresses was 
refused with "invalid local account" messages) for a full year (12 calendar 
months). At the end of those 12 calendar months, the accounts were 
unblocked and all mail they receive (which, at this point, is *nothing* but 
spam, as any legitimate correspondent to those addresses were notified that 
they were no longer valid prior to them being disabled) is directed to spam 
filters.

Each mail received on one of these spam trap addresses is header analyzed. 
Each IP address (real or forged, doesn't matter) in the headers is looked 
up for RDNS. I then create a pattern for the RDNS and add that to my 
blocking list. For example:

62.73.63.106 resolves to adsl-63-106.kotikaista.lsp.fi

I would then create a pattern of "adsl*.kotikaista.lsp.fi" and add that to 
my blocking list. From the time that is added, all mail *originating from* 
an IP address which has RDNS matching that pattern is rejected as spam.

While I agree that there is a possibility of unintentional rejecting based 
on this, I review my mail logs on a daily basis, and I'm in direct  contact 
with my mail clients regularly to discuss any mail problems (such as 
missing or misdirected mail).

I also have contacted major ISPs (especially those from which I receive a 
high volume of direct-to-MX spew) to request information on their 
designated out-MX IP addresses, and those who responded have been 
whitelisted locally (thus bypassing these checks).

The net end result is to block direct-to-MX spam (and worm spew) from 
dynamic addresses and known spam havens.

Has there been any collateral damage? Sure. There have been (at last count) 
17 emails that were blocked in error by this method. That's out of 3 months 
of operation. Of those 17 emails, only two were "unrecoverable" (meaning 
the sender was unable to be contacted to resend the mail after appropriate 
whitelisting). In all but 4 cases, the intended recipient never needed to 
be aware (but was informed anyway as a matter of policy), as the problem 
was caught by me and the sender contacted for whitelisting information and 
resubmission of the email before the recipient had even noticed that the 
mail was missing.

However, this is in no way a recommendation for this kind of blocking on 
other systems. It works well for me, it is true. But every system must find 
a method that works for them. I have a small user base, and I'm able to 
spend the time necessary to maintain the setup. It is somewhat labor 
intensive, and would definitely not scale to a larger operation (well, some 
portions of it would, but the threshold for blocking would need to be much 
higher than I currently use). Not to mention that the various checks and 
special handling required some custom mods to Xmail locally.

If you wish to be pre-emptively whitelisted on my server, and are willing 
to accept full responsibility for any spam received from your whitelisted 
servers, please feel free to contact me off the list. I don't have any 
problem with whitelisting mail servers. However, whitelisting is only 
needed if your mail server fails one of the following tests:

1) Server IP address has never been seen in spam locally
2) Has proper RDNS (the connecting IP address has a matching PTR record)
3) HELO/EHLO name resolves (name has a proper A record)
4) Has an MX record which matches the domain on the MAIL FROM: address

If your mail server can pass all those tests, then there is no need for 
whitelisting.


-
To unsubscribe from this list: send the line "unsubscribe xmail" in
the body of a message to [EMAIL PROTECTED]
For general help: send the line "help" in the body of a message to
[EMAIL PROTECTED]

Reply via email to