On 13 jan. 2012, at 21:13, email builder wrote:

>>> We use a modified version as a HELO blacklist. This avoids the false
>>> positives we saw while testing it as a reverse DNS restriction but,
>>> because the use of the reverse hostname as the HELO string is a
>>> common pattern in spam attempts from compromised hosts, it's still
>>> very effective.
>> 
>> Interesting... can you provide specific details on what you mean by 
>> 'modified version'?
> 
> I second that.  I'm feeling convinced enough to use it as it was
> intended, BUT ideally, I don't desire rejecting even those stubborn
> people who insist on running their email server from their bedroom
> without relaying through their ISP.
> 
> Do you have a script that modifies the list into whatever format your
> method requires?
> 
> Does anyone have any comments on the efficacy of this method?
> 
> I assume all it would take is for bots to change the way they
> create their HELO hostname to bypass this.

The modifications are rather basic, really.

We've commented out some lines that were giving us false positives,
and modified the REJECT message to match its context, as well as
adding the error code we use for post processing and the like.

Legitimate mail servers aren't an issue for us, since they do not
use the reverse DNS string as their HELO greeting, and therefore 
they do not get rejected. They might get rejected for other reasons
(hello 'sbs2003.local'!) but that's not during this step.

It's currently maintained by hand, as automating it would take
more time that it'd save right now. Premature optimization etc.

As for bots changing their habits, I am not worried. New patterns
do emerge at times, but old habits die hard. If at some point it
turns out that it is no longer as effective, like after an upgrade
to 2.8 or higher, it will be reevaluated.

Cya,
Jona

--

P.S.: As for false positives, we had to comment out the following;

/^dd[1-9][0-9]{3,5}\.kasserver\.com$/
/^h[1-9][0-9]{3,7}\.stratoserver\.net$/

They are the default HELO strings for DS/VPS providers here in
Europe. The reverse DNS has often been updated to match the
domain name of the main website or whatever, so it tends to be
unique to our way of using the list.

We have tried in the past to get people to update their HELO, but
that turned out to be futile, and the amount of FPs we get from
it are higher than the spam attempts blocked.

Hence their removal from the list. YMMV, of course :-)

Reply via email to