> -----Original Message-----
> From: Jorey Bump [mailto:[EMAIL PROTECTED]
> Sent: Monday, October 13, 2008 2:35 PM
> To: Joey
> Cc: postfix-users@postfix.org
> Subject: Re: Finally blocking some spam
> 
> Joey wrote, at 10/13/2008 01:42 PM:
> 
> > You reach a point where the money we think we are profiting from
> > services sucks up all our time and resources and somehow we have to
> > reduce that overhead and SPAM. Imagine that we are blocking millions
> > of spam messages a month through various methods and we have clients
> > complaining about spam... what are we to do.  It gets really old.
> 
> No argument here. :)

Finally someone on my side ;)

> 
> Of the remaining spam that gets past my defenses, nearly all of it could
> be stopped by the following:
> 
> 1. Require Forward Confirmed reverse DNS (FCrDNS), where the IPs must
> match in a IP -> name -> IP lookup.
> 
> 2. Require reverse DNS (rDNS), where the connecting host must have a PTR
> record, returning a (valid) host name in an IP -> name lookup.

We require FQDN and reverse, but it's not enough as you can imagine.

> 
> 3. Require encrypted connections via STARTTLS.
> 
> FCrDNS offers a lot of promise, but if Network Solutions can't even get
> it right (when its parent company, Verisign, controls a huge chunk of
> DNS), there's little hope that other sites will. I'd like to apply the
> ipt_recent module to hosts without FCrDNS, but there is little desire
> for filter developers to base rules on realtime DNS lookups, since it
> can introduce significant overhead and a host of other serious problems.
> Selective greylisting aimed at FCrDNS offers some hope, however, as many
> of the offenders don't appear to retry.
> 
> Many school and government sites (not to mention China) can't seem to
> configure rDNS and FCrDNS properly. I have given up trying to contact
> offending sites. Too often, they decide the solution is simply to drop
> the recipient from a mailing list, instead of correcting their DNS
> records to improve the robustness of their mailings. It's a shame,
> because things got pretty quiet on my test domains during the weeks I
> implemented reject_unknown_(reverse_)client_hostname.
> 
> Requiring encryption is a pipe dream, and as Wietse has mentioned,
> introduces a greater risk of exposing bugs as a result of linking to a
> large base of external code.

Somewhere government ( which I don’t want them to control, but is the only one 
that can step in ) has to step in and setup hard and fast laws and rules based 
on a committee of knowledgable people ( Wietse etc ) to create a system which 
requires registration and has accountability for when spam is sent through your 
equipment.
At this point though I think of that as a pipe dream and we each as admins have 
to take whatever methods work for us to accomplish the goal.



Reply via email to