On 20 Jun 2016, at 1:52, Voytek wrote:

I have a user who can not receive emails as his correspondent's domain is currently on multiple rbls.

As an interim measure, should I look at temporarily allowing this domain?

Look? Sure. When someone claims a need to receive mail from someplace and is paying you to handle their mail, you should at least *consider* exempting the source from automated blocking mechanisms. It would be irresponsible to hand over your spam filtering to an arbitrary collection of external sources and never look at the possibility that they've made mistakes or subjective judgments that you would not agree with.

Should you actually do it in this case? I would not. See below

Or, is that a bad idea, shouldn't consider such temp workarounds?

As a generic question, only you (or whoever pays you to be a mail admin) can answer that for the particular circumstances on a mail system you administer. As someone who handles technical and policy issues for a diverse set of mail systems, in some cases I whitelist sources almost any time a user asks for it. In other cases, there is an absolute policy of no system-wide whitelisting. However, in nearly all cases I give users some form of self-service partial whitelisting via patterned aliases, so it is quite rare that whitelisting decisions make it to me or other admins.

HOWEVER: In this particular case, the address in question would currently be beyond all whitelisting mechanisms on all systems I administer. See below.

domain in question:

____________________________________

Checking ckchaiseree.com which resolves to119.59.120.56 against 107 known blacklists... 
Listed 7 times. 

Blacklist Reason 
LISTED CBL
119.59.120.56 was listed 
LISTED ivmSIP
119.59.120.56 was listed 
 LISTED ivmSIP24
119.59.120.56 was listed  
LISTED Protected Sky
119.59.120.56 was listed 
LISTED SORBS SPAM
119.59.120.56 was listed  
 LISTED Spamhaus ZEN
119.59.120.56 was listed  

Obscured detail here:

56.120.59.119.zen.spamhaus.org has address 127.0.0.11

That's a Spamhaus-entered PBL result, which means Spamhaus believed at some point that this was a dynamically assigned address and that no one responsible for the IP address has bothered to assert otherwise. It is easy for anyone to remove such a listing.

56.120.59.119.zen.spamhaus.org has address 127.0.0.4

That's a CBL listing, which means the address has recently been detected as behaving in some way idiosyncratic to systems under the control of some form of malware. In this case, the latest misbehavior was approximately 1 hour ago according to the CBL record. CBL listings also can be removed through a self-service system, but if the address continues to act like part of a botnet, it will get re-listed and de-listing will become slower each time. Ultimately, a machine must STOP acting like part of a botnet to get off the CBL and stay off. CBL has occasionally made mistakes about such detections, but they are also VERY good about fixing their misjudgments and publicly admitting to them. I doubt that this listing is in error, since my personal system has been the target of malware-like behavior from that IP within the past month.

56.120.59.119.zen.spamhaus.org has address 127.0.0.3

This is a CSS listing, which means it has hit the automated detection system Spamhaus uses to detect "snowshoe" spammers who spread their spam sources across many different IP addresses to avoid simple volume detection. It's possible for CSS to make mistakes but they rarely persist since listings automatically expire and Spamhaus works with legitimate senders to avoid any chronic mis-detection.

56.120.59.119.zen.spamhaus.org has address 127.0.0.2

This is a simple SBL listing, meaning that a human being at Spamhaus has evaluated evidence of spamming via the address and determined that there is a persistent policy problem enabling the spam which must be dealt with by the ISP and discussed with Spamhaus to resolve the listing. Sometimes they make mistakes but in this case it looks unlikely. See https://www.spamhaus.org/sbl/query/SBL274933 for the details and note that they didn't even include the registered range (a /19) or the announced route (a /24) but just the /25 from which they have a large number of spam samples with topically similar and quite spammy subjects.

This combination of listings would be absolutely prohibitive on every Postfix system I run. CBL listing alone puts an address past my postscreen threshold even if the address is on every public whitelist I use in postscreen. On the non-Postfix systems I run, CBL & PBL .11 both have no exemption mechanisms since they both have self-service delisting mechanisms. Strength of CSS and SBL listings varies more between different systems, but either alone is enough to reject mail absent any whitelisting and together they score at or above the point of no possible mitigation on every postscreen config I manage. On other systems, an IP in both SBL and CSS (absent CBL & PBL) would require multiple whitelisting mechanisms to get mail accepted, since the combination would be lethal in SpamAssassin without a hitting substantial combination of negative-score rules (e.g. recipient in more_spam_to, explicit SPF or DKIM whitelisting, etc.)

I cannot conceive of any circumstance where I would make any sort of effort to allow mail from an IP with this constellation of Spamhaus listings to get to any user. Any legitimate sender using that IP for email has made a serious error of some sort and must either fix the system if it is theirs or find a different path for their email if the IP is intentionally shared in a way that is outside of their control. The likely explanations for this sort of multi-listing make ANY sort of whitelisting problematic because the IP address is clearly not under the control of any truly responsible party and trusting anything flowing through it cannot be justified.

Reply via email to