On Jun 15, 2012, at 12:32 PM, Charlie Brady wrote:

> On Fri, 15 Jun 2012, Matt Simerson wrote:
> 
>>> In my experience, reverse DNS is frequently managed (or, frequently, not 
>>> managed) by an ISP, not by the admin of the mail server.
>> 
>> In my experience, every ISP that provides clients with dedicated IPs 
>> also provides the client with the ability to manage the reverse DNS for 
>> them.
> 
> My ISP (a smallish not-for-profit affair) claims to be unable to do that. 
> I've heard of and seen other ISPs which fail also. I agree that most ISPs 
> offer this service. A single exception is sufficient to say this can't be 
> guaranteed.

Why does this matter?  Having a custom FQDN that you can manage is not required 
by RFC 2821 or my helo plugin.

The RFC requires that you use the FQDN (and presumably matching rDNS) that's 
assigned to your IP as the HELO hostname.  If your smallish ISP isn't capable 
of managing DNS properly, and you don't have a meaningful FQDN, then you use an 
address literal. 

The RFC tests in the new helo plugin are VERY low bars to clear. In the default 
'lenient' mode, no DNS validation is performed at all. In RFC mode, if you 
present a HELO hostname, then that hostname must have SOME kind of working DNS. 
It doesn't even have to be a match unless 'policy strict' is chosen. 

Of the 40,494 messages in my logs, 22,418 of them have invalid HELO hostnames 
and 158 messages are using address literals. Almost half (67) of the literals 
are from valid users of my mail server.  Which is why I don't block address 
literals. But I can safely do so now without causing my users problems because 
of the deferred rejection and auth clearing features of the naughty plugin.

Of the 22,418 messages with invalid HELO hostnames, Windows based senders 
accounted for 18,971. Linux accounted for 3,172 more, no doubt consisting of 
compromised and illegally obtained VPSes. After I further eliminate the senders 
who had relay_client set, what's left is a small handful of valid servers using 
invalid HELO hostnames, like mail.es.freebsd.org, nkNNpNNmm-asmtpout001.mac.com 
(where the NN numbers mismatch), and lists.openbsd.org.

In all of those cases, the servers DO have valid forward and reverse DNS, as 
defined in the helo plugin tests. It's just that the DNS does not match.  Of 
course, there's also plenty of matching HELO hostnames with DNS that doesn't 
match, due to server clusters (Yahoo, Gmail, .mac, etc) and the like, which is 
why the no_matching_dns test only validates that the domain is the same.

The false positive rate with 'policy rfc' is presently 0%.  With 'policy 
strict', the FP rate is 0.025%.  If only 2 servers had matching DNS 
(mail.es.freebsd.org and lists.openbsd.org), the FP rate for 'policy strict' as 
currently implemented would be 0%. 

Matt

Reply via email to