On 27 Jan 2012, at 23:57, Jeroen Geilman wrote: > On 01/26/2012 10:37 AM, Gábor Lénárt wrote: >> First of all, I know sending NDRs is not a great idea. > > .. they are a requirement of SMTP. > What on Earth posesses you to think they are bad ?
An increasingly crackpot attitude towards all forms of backscatter by the "Spam fighters" and other supposed legions of the light, I suspect. The idea is not to generate bounces in case the sender address is forged. While it's a legitimate concern, it's not enough of a concern to deny senders disposition reports. Those people affected by enough backscatter should seriously consider employing BATV. TMDA also has a built-in address signing mechanism which you should be using anyway if you use TMDA at all to help with this. A very small number of things are affected by SES; whitelist them (EG ezmlm, which has problems of its own worth considering replacing it anyway). >> However, still, I would like to make things better by passing NDRs to >> another server: its task is only send out the NDRs, nothing more. It would >> help to analyze/block the NDR traffic there, also if that server is >> blacklisted >> (because of being source of "backscatter"), it's not a real problem, as >> "normal" mails are not sent from there. > > I have no idea what you mean here. > Why should bounces be sent by a different server ? He wants to send bounces through another IP so *that* IP can get blocked. He wants to reduce the effects of getting blocked to just bounces, when one of the legions of the light swoop on him for daring to send backscatter. Example: http://www.backscatterer.org/ . Qmail has this as a patch. Courier has some nice backscatter suppression logic in it, to stop trouble users causing more trouble over a short period of time. These are both reasonable approaches. > If you're not already using proper client DNSBL blacklisting, as you seem to > indicate above - you're really running a decade behind the times. > > And if YOU are generating backscatter, then you are not using sufficient > restrictions on incoming mail. > > DO NOT accept mail that you cannot deliver. These are points I'd rather not debate, though not from agreement. I think it is fair to say though that where options exist not to accept mail, according to your policies, then you should not accept that mail. This almost always includes protocol violations, viruses, known spam, MX relay RCPT, etc. It won't include autoresponders, challenge-response, mailing list servers, failed/delayed mail, etc, at least until implementations of some of these come along which reject at SMTP time, where that makes sense. Cheers, Sabahattin