Am 14.07.2011 01:28, schrieb Stan Hoeppner:
> On 7/13/2011 3:08 PM, mouss wrote:
>> Le 13/07/2011 19:04, motty.cruz a écrit :
> 
>>> Received: from ucmx01.uzuncase.com (66-193-162-90.static.twtelecom.net
>>> [66.193.162.90])
> 
>> you might start with
>> /^(\d+\W){4}.*\.twtelecom\.net$/     
>>      REJECT generic hostname. please use your ISP or fix your DNS.
> 
> This wouldn't be wise mouss.  It would reject all mail from a legit
> site.  This is a SOHO IP range in Georgia, USA, occupied by an
> engineering firm, Uzune & Case.  

SOHO or not: ip-addresses in PTR are mostly not real mailservers
or maintained by foolish administrators because someone
with a little knowledge would call the A/PTR "mail.twtelecom.net"
or "smtp.twtelecom.net"

> Rejecting all of their mail simply based on the generic rDNS of their
> outbound MTA is a wrong move

no it is the right move

> especially since the string clearly
> identifies a static range

what has nothing to do with mailserver or not
we own also a static /24 range and on this range are some
mailservers, but this does not change anything in the fact
that a infected workstation would come out with one of
this IP-Addresses but NOT with a mail-hostname

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to