On Sun, May 13, 2001 at 04:13:43PM +0530, Suresh Ramasubramanian wrote:
> Using a large mallet, Horace G. Friend III whacked out:
> 
> > I read from the RedHat Sendmail HOWTO that the forward and reverse DNS
> > "should" match. This became necessary due to the proliferation of spam
> > mails on the Net.
>  
>  Then they are wrong about it.  Could you paste the relevant section into a
>  mail (and maybe mail me offlist or take this to news.admin.net-abuse.email -
>  either of these will be more on topic to mutt-users) :)

The document doesn't say that "the forward and reverse DNS should match"
but this is what I gathered from reading paragraphs 3 and 4 of Section
4.1.2 of the faq, and I quote:


4.1.2 Masquerading, relaying and a word about UCE

 The masquerade lines shown above are critical. YOU MUST HAVE THESE
 LINES IN ALMOST ALL CASES for the stand alone environment using a
 dial-up connection. Why is this so important? Let's compare an email
 message to a letter sent through the postal service. When you address
 the envelope you provide several pieces of information so the postal
 service can do their job correctly. You would write the person's name
 and address that you want to send it to and you would also write your
 name and mailing address so that if the letter can't be delivered, it
 can be safely returned to you. After you post the letter what does the
 postal service do? They pick it up and attempt to deliver it based on
 the information you provided. 

 Now, if you had a criminal mind and wanted to mail something malicious,
 you wouldn't put your correct return address on the envelope would you?
 Probably not. If you put a false return address and the message was
 ultimately undeliverable the postal service wouldn't be able to return
 it to you. In this example, everything is very anonymous and you can
 send out garbage without being held accountable. Just a few short
 months ago, Internet based electronic mail worked the same way. You
 could send out garbage with a false return address and it wouldn't be
 returned to you if it proved undeliverable. Granted, this is not a very
 nice thing to do but it happens all the time. 

 In order to eliminate this abuse the people who develop code for Mail
 Transfer Agents (MTAs -or- the post office in our scenario) started to
 tighten things up a little bit. These much improved MTAs now check that
 the sender's envelope address is valid before they will relay, or
 deliver, a message. What this means is that the post office
 transmitting the message must exist... it has nothing to do with the
 from address. This is a good thing but it has caused problems for many
 people, particularly those who use an MTA rather than client software
 to send their mail... translation... the dial-up user with a Linux box
 is likely to get a bunch of bounced mail unless he or she configures
 their MTA to properly masquerade the envelope and relay through their
 provider's MTA. 

  It's not enough to set the From: and Reply-To: addresses in a piece of
  email client software because, much like a regular letter, all this
  does is tell the person who receives the message who it's from
  (maybe). The newer versions of sendmail (particularly since the
  release of 8.9.1) and other modern MTAs are more concerned with which
  mail server or MTA it was sent from than they are with which user sent
  the message so they read the message envelope. They're not looking for
  the person that sent it by checking the sender's From: or Reply-To:
  email address, they're checking to see if the post office, or MTA, the
  message came from is a valid host and that the domain is also valid.
  This is equivalent to checking the zip code of origin on a letter.
  Once this information is excerpted from the message it's verified via
  reverse DNS to see if the sending post office and the ?From: domain
  exists (in other words, would the sending MTA would receive a bounce
  if the intended recipient didn't exist) and if that post office (the
  sending MTA) or the domain does not exist, then the receiving MTA will
  reject the message. We fix this by configuring our MTA to masquerade
  the envelope and then we relay our messages through our ISP's mail
  host which gives our mail the final stamp of legitimacy it needs. 


Paragraph 4 says that a reverse DNS is done to verify that the source
(mail server or MTA) of the msg is valid. And the receiving mail server
does this by doing a reverse DNS. 

And I guess this is the reason why iname.net appended "maybe forged" in
it's Received header.

Okay, the doc says nothing  about the forward and reverse DNS that
"should" match for mail transfer to take place, but I think it's "BAD"
practice for any mail server to use non-matching forward & reverse DNS.

"Am I getting confused?" :)

>  
> > I guess by clean, I meant spam free.
>  
>  right
> 
> > Honestly, I'm not looking for a 100% spam-free environment because
> > that's next to impossible without blocking other legit mail.
>  
>  tough :)
> 
> > What get's my goat is that someone (and outblaze.com tops the list)
> > intercepts mails and/or pretends to be someone else. Here is the header
> > >from the Java Developer Connection Newsletter which I subscribe from.
> > It's even got a "Precedence: Junk" in it. Can you believe that?
>  
>  its a standard feature of an MTA man, and Precedence: Junk is inserted by many
>  mailing lists so that mailservers can allot lower priority to list mail (and
>  autoresponders)
>  
> > Received: from spf8.us4.outblaze.com (205-158-62-35.outblaze.com
> > [205.158.62.35] (may be forged))
> >     by smv19.iname.net (8.9.3/8.9.1SMV2) with ESMTP id DAA20037
> 
>  from sun.  the outblaze <-> mail.com handoff is an internal thing which you
>  can ignore safely
> 
> > From: JDC.C&[EMAIL PROTECTED]
> 
> they are wrong in not qualifying their address - and in using & in the address
> :)

Okay, so it is a standard feature. I'm just wondering how come they are
sending me this bulletin that they've classified as "junk" when I am a
subscribed member and receive several mails from them regularly
regarding their promos and all sorts of things with nary a complaint. :(

Maybe it's about time I should ask them for some answers.

Thank you all for making this a very enlightening and frustrating
exercise in trying to block spam and learning how to verify legit mail
by taking a look at mail headers for any signs of forgeries.

> 
> -- 
> Suresh Ramasubramanian + Lumber Cartel India - <tinlcI>
> mallet @ cluestick.org + Wallopus Malletus Indigenensis
> EMail Sturmbannfuhrer, Lower Middle Class Unix Sysadmin

-- 
Horace G. Friend III
[EMAIL PROTECTED]
GnuPG DSA/ElGamal Key Fingerprint
9295 80C4 C723 621B 9C2D  B53E D432 7936 4CA9 8AD6

Reply via email to