I went live with my postscreen blocking mail, after some time of 
non-blocking while watching logs. Here's a discussion of those 
results (both non-blocking and blocking.) I've singled out some of 
the items which interested me; perhaps they will interest you as 
well. (Possibly all old-hat to the ones who leapt in early.)

* Settings
  ========

postscreen_dnsbl_sites =
    zen.spamhaus.org*3
    b.barracudacentral.org*2
    dnsbl.njabl.org*2
    bl.spameatingmonkey.net*2
    dnsbl.ahbl.org
    bl.spamcop.net
    dnsbl.sorbs.net
    spamtrap.trblspam.com
    swl.spamhaus.org*-5
    list.dnswl.org=127.[0..255].[0..255].0*-2
    list.dnswl.org=127.[0..255].[0..255].1*-4
    list.dnswl.org=127.[0..255].[0..255].[2..255]*-6
postscreen_dnsbl_threshold = 3
postscreen_dnsbl_action = enforce
postscreen_greet_action = enforce

* Gripe
  =====

The one thing I do not like about it is that the DNSBL given as the
reason for rejection is semi-random, specifically it seems to be the 
first one to hit dnsblog(8) for that client.

My postscreen_dnsbl_sites are arranged in trust order. If a real 
person was to see one of these rejections, I would prefer that this 
person see Spamhaus or Barracuda or NJABL, not SORBS, Spamcop, or 
TRBL. I know my workaround is to use postscreen_dnsbl_reply_map,
shown here in pcre:
    !/^zen\.spamhaus\.org$/    multiple DNS-based blocklists
But, I'd prefer for logging to sort the dnsblog names by score, 
highest first, and use that DNSBL name as the reason.

(This workaround is in place and working fine.)

* Scoring and whitelists
  ======================

Thanks to Noel for getting me thinking about DNS whitelists. I am 
doubtful that they will matter much overall, but they do seem to be 
conservative so far. Mine have offset only a few negatively-scored 
hosts from my less-trusted (1 point) DNSBLs, mostly. There were 2 
DNSWL hits for spameatingmonkey hosts, and zero for AHBL, so I am 
considering switching their places (and scores) in the above list.

The largest part of my DNSWL hits are weighted toward lower-scored 
hosts. Out of 610 in the sample period I had 474 + 89 + 34 + 13 of 
127.0.x.Y where Y is 0, 1, 2, and 3 respectively. I'm not seeing a 
lot of hits in SWL so far, and the few I did see were also found in 
DNSWL. (No SWL host was listed in any of the DNSBLs.)

Overlap between dnswl.org and the DNSBLs listed was as follows:

  Also listed in:
  ---------------
  bl.spameatingmonkey.net   2
  bl.spamcop.net            4
  dnsbl.sorbs.net          24
  spamtrap.trblspam.com    52

Of these, only 5 were listed on more than one DNSBL. All 5 of these 
were listed on TRBL; 3 also on spam.dnsbl.sorbs.net (127.0.0.6), and 
the other 2 also on bl.spameatingmonkey.net (127.0.0.10). Not 
surprisingly, each of the DNSWL listings was a .0 (trust level 
"none".)

  DNSWL-SEM-TRBL
  --------------
  174.34.187.66   list.dnswl.org          127.0.15.0
  174.34.187.66   bl.spameatingmonkey.net 127.0.0.10
  174.34.187.66   spamtrap.trblspam.com   127.0.0.2

  174.34.187.67   list.dnswl.org          127.0.15.0
  174.34.187.67   bl.spameatingmonkey.net 127.0.0.10
  174.34.187.67   spamtrap.trblspam.com   127.0.0.2

Note, the DNSWL-SEM-TRBL triples are right next door to one another, 
which suggests that a netblock listing might have been done. These 
particular hosts are an ESP:
    http://www.yourmailinglistprovider.com/antispam_policy.html
I don't know how good (or bad) they are, but they do offer a free 
trial, so they're likely to attract spammers.

  DNSWL-SORBS-TRBL
  ----------------
  66.192.165.130  list.dnswl.org          127.0.15.0
  66.192.165.130  dnsbl.sorbs.net         127.0.0.6
  66.192.165.130  spamtrap.trblspam.com   127.0.0.2

  216.27.93.124   list.dnswl.org          127.0.15.0
  216.27.93.124   dnsbl.sorbs.net         127.0.0.6
  216.27.93.124   spamtrap.trblspam.com   127.0.0.2

  195.121.247.8   list.dnswl.org          127.0.5.0
  195.121.247.8   dnsbl.sorbs.net         127.0.0.6
  195.121.247.8   spamtrap.trblspam.com   127.0.0.2

The first two of those are the ESP iContact.com. The latter is KPN, 
an ISP in Europe.

The breakdown of dual listings by DNSWL trust level is what I would 
expect:

  dnswl.org returns: ##   ## per DNSBL
  ------------------ --   ------------
  127.0.x.3 (high)    3    2 TRBL
                           1 SORBS spam (127.0.0.6)
  127.0.x.2 (medium)  0
  127.0.x.1 (low)     0    9 SORBS spam (All of these: Facebook)
  127.0.x.0 (none)   70   50 TRBL
                          14 SORBS spam
                           4 Spamcop
                           2 Spameatingmonkey 

FWIW the three high-trust hosts are all well-known listservers: 
outgoing.securityfocus.com and webster.isc.org on TRBL; and 
vger.kernel.org on SORBS. No, I'd not want to lose mail from them.

The non-trust hosts are about evenly split between ESPs and ISPs. 
These, I did not bother to examine as carefully other than that. 
Seems like some more aggressive sites might want to score lower for 
dnswl.org's 127.0.[5;15].0 than for other values of the third quad.

Oh, and of course, thanks also to Mathias for running DNSWL. Looks 
like you're doing a good job. I signed up and got listed with a 
"medium" trust score (which is probably fair; if anything, to be 
honest, possibly a bit too high. I'm not full-time on this, and if
something went wrong and we were being used by a spammer, there 
could be a delay in our response to complaints.)

* Subjective & Plans, Conclusions
  ===============================

I have (had!) pretty good spam controls in place before this. I do 
not expect to see any substantial decrease in spam getting through, 
simply because most that the postscreen blocks was already being 
blocked by smtpd. I did see a couple in the last few days before 
starting postscreen_dnsbl_action=enforce which were not in Zen, yet 
scored above my postscreen_dnsbl_threshold.

Whilst I do not relish a return to the pain of greylisting, I am 
planning to activate the deep protocol tests after a bit. I'm 
thinking that the post-220 tests might nearly wipe out the spam I get 
other than snowshoe, and delays can indeed help with snowshoe in some 
cases (giving the DNSBLs more time to list them.)

I'm still not using any kind of content filtering here, but that 
remains a possibility for the future. URIBL checking should mop up 
the snowshoe spam and "leakage" from the otherwise legitimate mail 
hosts.

I am pleased with my list of DNSBL (and dnswl) sites and their 
scoring. I could add in a few more and still feel safe, except for 
having more DNSBLs to keep up with.

I'm confident in those lists insofar as that they're adhering to 
their policies. I'm sure their spamtraps are being hit by the 
whitelisted hosts; but I'd not be comfortable using TRBL or SORBS as 
a reject_rbl_client lookup.

It's not a FUSSP, and it won't be, unless/until a new secure mail 
protocol is adopted and everyone switches to it. Spammers will be a 
moving target, always. But I definitely feel like we're ahead in the 
game for now. Thanks Wietse, and also thanks to those early adopters 
who provided the feedback on postscreen.
-- 
    Offlist mail to this address is discarded unless
    "/dev/rob0" or "not-spam" is in Subject: header

Reply via email to