Nick Leverton wrote:
On Sun, Mar 06, 2005 at 03:50:23AM -0500, Bob wrote:
Check the MX for the domain in dns to see if the mta now
connected is an authorized mta for the From: domain. If not,
Unfortunately this useful sounding check doesn't work. Many ISPs and many big users have different incoming and outgoing MTAs, and obviously only the incoming ones are listed as MXs, yet your connection will come from their outgoing MTA.
For instance, my ISP's outgoing SMTP smarthost (which I don't use anyway, before anyone goes looking at my headers :-)) is 217.8.240.35, which is not one of my MXs (195.173.23.50 and 217.8.240.60). This sort of thing makes it much easier for them to have different rules and restrictions on outgoing mail than on incoming.
Nick
OK, which means more is unfixably "broken" about mail standards. And in this thread context, I have to give up on replacing an over-zealous rfc-ignorant with my own rfc-ignorant realtime checking of MX in dns. Info acquired won't support a decision, it's useless except to feed into spamassassin or the meta handler plugin running spamassassin and second instance of rhsbl dnsbl plugins only using the over the top rfc-ig and sub-net dnsbls.
My ISP which I use for @his_domain:25, not @mine, does not have dns for his mail2 cluster blade, so the dnsbl's then look at his sub-net block, de-alias to broadwing, and blacklist him. All he needs to do is set up dns for [EMAIL PROTECTED] For some inexplicable reason he won't, which combines with rfc-ig blacklisting yahoo for not notifying rfc-ig after doing what rfc-ig wanted(close a spammer account). I can't use rfc-ig, I can't do my own realtime rfc-ignorant test as far as check the mta to see if it's listed as MX.
BOHICA.
Right now I've got 100% spam blocking, but only by using dnsbl sites that are blocking my isp and yahoo. Nice while it lasted(three days to figure it's broken that way).
Another seemingly broken thing is reverse dns. Of course I'm not even suggesting that could be a test, far from it, there is no requirement that our upstream either designate us secondary rdns for ourselves, or to provide even one IP's rdns to our mailserver. That might get bad as a lot of blacklists want to block dsl sub-nets as "dynamic or residential". The only defense there would be to use every means to accreditize oneself(MX, spf, rdns, abuse@, postmaster@, shower, shave, haircut, starch-stiff neck). Also even for big bucks, ARIN won't let us stake a claim to our own rdns unless we own a /24(if a /24, and paying ARIN, you put your two no-glue rdns server names in ARIN "POC comment"). Not a big deal, but it's an issue that nobody has to serve rdns for anybody under a /24. They don't even have to take your money. No way to squat it that I know of.
If you have put up with me so far, here's another idea. If MX dns info is not enough to decide on, and rfc-ignorant blacklists ignorantly, the MX test and the rfc-ignorant test and any dnsbl site which blocks sub-nets have to be moved to spamassassin testing, and/or under the handler which runs those plugins plus spamassassin, contributing to a fuzzy score. And continue to greylist at data_post instead of data, which I assume lets spamassassin and/or the handler-scorer plugin learn from the message body and run the over-the-top rfc-ignorant and sub-net dnsbls.
-Bob