[EMAIL PROTECTED] wrote:

On Sun, 6 Mar 2005, Bob wrote:



Peter J. Holzer wrote:



Check the MX for the domain in dns to see if the mta now connected is an
authorized mta for the From: domain. If not, we're done (can't require
spf but MX in dns is fair to require, because otherwise it's an "open
relay"), if so, we might check



That's bad news. I worked for a major ISP that used separate
inbound and outbound servers (multiple for each), and only the inbound
were tagged as MX. Many other ISPs do the same thing.


You're right. My ISP doesn't have dns or rdns, which is
common and we have to live with it(I'd like rdns but the
upstream goes all the way to Broadwing before anybody
accepts responsibility, and they're too big to talk to me,
and there's no way to squat rdns. My ISP doesn't even
have forward dns, no IP assigned to his outgoing, so
dnsbl's whois him to sub-net and blacklist him as spam
harbor "Broadwing".

we might check to see if the mta will accept a connection From: as
To:(and From: <>?).



This might also be bad news. Many systems that do this ASSUME that if they get a 5?? error, the (postmaster, for example) account doesn't exist, but it could be rejecting for other reasons (like nullsender1rcpt plugin - the declude.com tests fail this one and assume the reason for it). I know I've been rejected by some mailing lists hosted on sourceforge because my postmaster address rejected their callback check - the postmaster account exists and does receive email, so their assumption means I have to go through a lot of extra hoops because of their stupidity.



If the From: mta won't even accept bounces or connect for
that From: as To:, then we broke a spammer and we're
done.



Again, you have to be able to differentiate between the various
reasons that the account may not be accepting your connection. If you
can't figure out why and deal with it accordingly, you shouldn't be
doing the test.


Right. We can see if the mta's are really there and conventionally
functional up to a point, assuming that reporting some errors
really sounds good compared to spam engines or trojaned pc's.

Since I found out rfc-ignorant is blacklisting yahoo for
failing to notify rfc-ignorant after closing a spammer
account rfc-ig wanted closed, and not for refusing to
shut down a spammer(2002), I'd prefer to do my own
rfc-ignorant check. An address check is not really an
address check for valid address--it's really a minimal
mta check for ignorance.



Just make sure that if the check is to find a valid postmaster account, you don't assume it doesn't exist just because you receive a 5?? error rejection - you may be incorrect.

        (Frankly, those checks really don't need to be done at all...)

Trust rfc-ignorant? They ban yahoo. "Kill them all and let
God sort them out" isn't letting yahoo or my ISP relay to
me.

Move my rfc-ignorant check to spamassassin or meta handler
running only the over-the-top dnsbl's rfc-ignorant and
spamassassin(handler or spamassassin runs John Wayne and
Salem Witch Trials), so blacklisting by those gonzos is only
going into a fuzzy score. And what could be better for versatile,
fuzzy listing of eclectic rubbish to support fuzzy decision making
under a broken standard? Perl and qpsmtpd and open source.

-Bob Dodds

Reply via email to