Eugene Podshivalov wrote:
> I've just received a spam email from a client who presented itself as
> emx.mail.ru but its ip 117.30.137.22 resolves to
> 22.137.30.117.broad.xm.fj.dynamic.163data.com.cn
> 
>  Are reverse client hostname and the ehlo one not supposed to match?

It's been an old traditional recommendation and best practice.

    https://en.wikipedia.org/wiki/Forward-confirmed_reverse_DNS

RFC1912 dates from 1996.  Back then we could count the number of
systems on the Internet.  Possibly someone knew each of them
individually!  I'm not saying it wasn't possible then.  And requiring
reverse DNS to map was one way to avoid dynamically assigned
addressing often used by abusers.  But now there are so many systems
on the network and they change so fast that this is definitely not
possible now.

And now some very large service providers will not provide Reverse-DNS
mapping for server's IP addresses.  This means that valid servers will
not be able to have a valid reverse mapping.  This means that if one
hard blocks on this full circle validity check then they will drop
valid email and people will not be happy.

Instead of Forward-Reverse-DNS matching the newer Best Practice is to
set up SPF, DKIM, DMARC for your own outgoing mail and other
anti-abuse for incoming mail.

Bob

Reply via email to