João Miguel Neves pisze:
Charles Marcus escreveu:
Here's a link informing why indiscriminate use of SAV is bad, and what
it should be used for:

http://www.backscatterer.org/?target=sendercallouts
OK, I've finished reading and analyzing that text. My conclusion is that there's no reason not to use reject_unverified sender.

In this answer I'm assuming 1) the postfix implementation of SAV and that any implementation and 2) that MTAs implement the RFCs (so they have a configuration that matches, for instance, the Book of Postfix).

There are 3 claims in that text:

1) That by disabling VRFY, a sysadmin has decided to disable all kind of email address verification.

Most people disabled VRFY to prevent spammer tests for email addresses, nothing else. If you want to disable all tests for email addresses you accept all email for all email addresses, even non-existing ones and later discard the invalid ones. That's the only way to do it (and the reason why some of my clients are using catch-all addresses that they redirect to /dev/null).
Well, if you discard any message which can be "real" message (not containing viruses etc.) just with typos, you just have no users to complain they didn't get important emails. That's it. In that case (private SMTP with few addressess and small traffic) you won't probably get blacklisted. The other scenario (many users, big traffic) ends up with your server blacklisted. Anyways - those clients which you mention, are in first scenario (few emails), or they don't use business cards and commercials in non-electronic forms, or there was no one to tell them what they are missing.
2) That a spammer can create a DDOS using SAV.

You'll get a connection per server to which those were sent (postfix caches the request, so it will only validate an email adress once).

SAV actually helps reduce the effect of the DDOS attack. In the non-SAV scenario, you get 30 million bounce messages. In the SAV cenario, each server does one check per email adress (that costs you less bandwidth and disk space than a Bounce message) and that single check will avoid several bounce messages.

That's not true. In some cases if you are checking envelope sender, you can see <>. How do you think you can deal with it? While you can get few thousands emails with forged return-path emails (existing or not - not a problem). Now imagine that your server is not the only one which received this amount of mails with same sender. Then you are performing DDoS. Anyways - you should not bounce messages for non-existent users. You should rather reject them (and that's efficient). And what's the point of having catch-all address when you discard those emails? Have on mind that you are still open to dictionary attacks. And in most cases spammers don't care if your email is correct or not. Still your emails are cool to be used for backscatter.
3) That SAV might create a loop.

The SAV check in postfix is done with the postmaster address by default. If the target server does the same check back, then the SAV server replies that postmaster is valid (assuming it's well-configured and RFC-compliant).

Have I missed anything?
Well, to be honest, I believe you did. If you will do many checks to the same server (have on mind large ISPs with many domains) with different emails, then probably your server will get blacklisted to send email from postmaster@ (at least). If you want explanation why, here it is: SMTP session to do SAV check is naither an email from individual to individual, nor message from receiver's system to sender. Of course it's also not wanted by sender, so in any case - it's spam and your server should be treated like any other spamming server. You hopefully understand my point of view. You don't have to agree - it doesn't matter.

Maybe this thread is a good reason to create BL containing servers doing large amounts of SAV checks? I'd be very happy if I could use such BL to reject emails from postmaster at those domains (and probably <> also).


Pawel Lesniak

Reply via email to