On Fri, 21 Nov 2003 21:41:23 -0800 John Oliver <[EMAIL PROTECTED]>
wrote:
> 
> Here are the dnsbls I use, the order I use them in, and the number of
> matches in the current maillog:
> 
> [EMAIL PROTECTED] joliver]$ ./spam.sh
> cbl.abuseat.org
>    4342
> dynablock.easynet.nl
>    1938
> sbl.spamhaus.org
>    1146
> dnsbl.sorbs.net
>     176
> bl.spamcop.net
>     427
> proxies.blackholes.easynet.nl
>       3
> list.dsbl.org
>      44
> dnsbl.njabl.org
>      16
> relays.visi.com
>       4
> relays.ordb.org
>       3
> dialups.visi.com
>       0
> 
> 
> cbl.abuseat.org is, hands-down, the highest-hitting dnsbl on all mail
> servers I admin.  

Maybe, maybe not. Trying to compare DNSBL's by rejection entries in your
mail server logs doesn't really tell you much about any DNSBL except the
first one. The problem is that once a given message hits one DNSBL, the
remaining DNSBL's aren't checked. So, the possible range of hits on the
subsequent DNSBL's can only be expressed in upper and lower bounds. 

Using your data, we know that cbl.abuseat.org hit on 4342 of your
messages. If dynablock.easynet.nl is your second DNSBL, we know it hit
on some number of messages greater than or equal to 1938, and less than
or equal to 6280. Any number in that range is consistent with your data
because _if_ all 4342 of the messages that cbl.abuse.org hit were also
in dynablock.easynet.nl, you would still have the exact same results in
your logs. There's no way to know exactly how many of those 4342 entries
are in dynablock.easynet.nl from the data you provided. The further you
go down the list, the wider the possible range of hits is. For example,
list.dsbl.org has somewhere between 44 and 8076 hits based on your data,
and we don't know any more than those upper and lower bounds from your
logs.

If you really want to compare DNSBL's, you need to set up a separate
process to query all of the DNSBL's you are comparing (nearly)
simultaneously. I do this by running 'tail -f
/var/log/maillog|myscoringscript' where "myscoringscript" is a script
that I wrote to extract IP addresses from the log and query all the
DNSBL's and tally the results. Actually, since my scripts work with the
new email security service I'm developing, they really don't work
directly with MTA logs, but if I wanted to do comparisons for a client,
I'd modify them to read the MTA's log format.

> I'm not aware of any collateral damage, but then, I'm
> *very* aggressive, and most of my clients happily use SPEWS ;-)  I would
> recommend to *not* use bl.spamcop.net at the MTA for a large-scale,
> production server... even *they* say not to.  It's too easy to game
> SpamCop.
> 
I've heard that, too, and I generally tell people that, but they do it
anyway. Even you seem to be a "do as I say, not as I do" type on that
one, too. 

In my comparisons, I did also check bonded senders, and I have seen a
few hits in both sbl.spamhaus.org and dnsbl.sorbs.net that were bonded
senders. I consider that to be pretty serious "collteral damage."

Finally, using a local copy of one of the DNSBL's that offers data
through rsync is a really good idea. Both cbl.abuseat.org and
list.dsbl.org offer rsync data for use with DJB's rbldns. I don't really
know if the other DNSBL's offer this or not, so don't assume that they
don't just because I didn't mention them. If you get a hit on the local
copy of a DNSBL, you'll avoid all remote DNS queries. That can be a big
issue if you have a very high volume MTA because the delays for remote
DNSBL's can result in a lot of smtp connections staying open for
relatively long times, consuming connection resources on the MTA host. 

-- 
Who is John Galt?


-------------------------------------------------------
This SF.net email is sponsored by: SF.net Giveback Program.
Does SourceForge.net help you be more productive?  Does it
help you create better code?  SHARE THE LOVE, and help us help
YOU!  Click Here: http://sourceforge.net/donate/
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to