On 2/4/2015 3:12 PM, li...@rhsoft.net wrote:
> 
> 
> *sadly* that sort of incoming rules is not widespreaded enough,
> otherwise spam from infected botnet zombies would no longer exist
> and frankly the rule for "IP....hfc.comcastbusiness.net" is manually
> written by look at the incoming junk amount all day long hitting the
> contentfilter and no single legit mail without SPF/DNSWL over months
> 
> /^[\.\-]?([0-9]{1,3}[\.\-]){2,4}[\.\-]?[a-z]{4,20}[\.\-]hfc[\.\-]comcastbusiness[\.\-](co|com|net|org)$/
> REJECT Generic DNS-Reverse-Lookup (PTR-Rule: 435) see
> http://www.emailtalk.org/ptr.aspx or configure
> http://en.wikipedia.org/wiki/Sender_Policy_Framework
> 
> even if it is not a directly reject *every* SpamAssassin setup on
> this planet gives you a penalty for such a PTR and that maybe the
> last piece needed for a milter-reject - in that case you don't know
> the reasons, with the reject above you do
> 
> score RDNS_DYNAMIC 2.639 0.363 1.663 0.982
> score NO_RDNS_DOTCOM_HELO 3.100 0.433 3.099 0.823
> 
> 

Your filter is broken if it can't tell the difference between a
static and dynamic PTR.

There are a lot of zombies in the *.comcastbusiness.* PTR space, but
you throw out the baby with the bathwater.  There are other ways to
get rid of the zombies on static IPs without wholesale blocking.
Greylisting and a couple reliable RBLs (or postscreen) will block
the vast majority of zombies without wholesale slaughter.

See, even you don't block everyone with an offending PTR -- you
check for valid SPF or dnswl.



  -- Noel Jones

Reply via email to