>...
>List-Id: <users.spamassassin.apache.org>
>Delivered-To: mailing list users@spamassassin.apache.org
>Delivered-To: [EMAIL PROTECTED]
>...
>Date: Tue, 01 Mar 2005 19:32:22 -0500
>From: "Eric A. Hall" <[EMAIL PROTECTED]>
>User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206)
>X-Accept-Language: en-us, en
>MIME-Version: 1.0
>To: Justin Mason <[EMAIL PROTECTED]>
>Cc: [EMAIL PROTECTED]
>Subject: Re: another request for RECEIVED[x] array
>References: <[EMAIL PROTECTED]>
>In-Reply-To: <[EMAIL PROTECTED]>
>Content-Type: text/plain; charset=ISO-8859-1
>Content-Transfer-Encoding: 7bit
>X-Virus-Checked: Checked
>
>
>On 3/1/2005 12:37 PM, Justin Mason wrote:
>
>> actually, there is such a thing in SpamAssassin 3.0.x ;)  e.g.:
>
>> debug: metadata: X-Spam-Relays-Untrusted: [ ip=199.172.62.20
>> rdns=europe.std.com helo=europe.std.com by=mail.netnoteinc.com ident=
>> envfrom= intl=0 id=392E1114061 auth= ]
>
>This doesn't record the 'with' parameter (as in "with SMTP" or "with
>ESMTP"), or any TLS info.
>
>> I want to have available to me are:
>>> 
>>> 1) Check for a reverse-DNS match
>>> 
>>> 2) Check for HELO (versus EHLO)
>>> 
>>> 3) Check for TLS
>
>I already have a reverse-DNS rule coded up but I'd like to consolidate it
>with the other two, but again, I really need a better view into the
>transfer protocol from inside SA.
>
>-- 
>Eric A. Hall                                        http://www.ehsco.com/
>Internet Core Protocols          http://www.oreilly.com/catalog/coreprot/
>

        Eric,

        Please note that is section 4.1.4 of RFC2821 it says:

"...
An SMTP server MAY verify that the domain name parameter in the EHLO
   command actually corresponds to the IP address of the client.
   However, the server MUST NOT refuse to accept a message for this
   reason if the verification fails: the information about verification
   failure is for logging and tracing only.
..."

        The capitalization is in the original, not added. Reference from:
ftp://ftp.isi.edu/in-notes/rfc2821.txt page 38, 6th paragraph of section 4.1.4

        On the other hand, both sendmail and postfix can be configured to
refuse messages if there is no rDNS at all for the HELO/EHLO or if the
client address doesn't have any rDNS.  I *would* recommend these, but
since the most common MTAs already have the capability, there shouldn't
be any need for SA to duplicate it.  Also, the number of FPs if you attempt
to enforce an exact match would be *very* high;  Whenever a MTA hosts multiple
domains, only one could possibly pass the test - but it is reasonable for
any host which is an 'MX' for a domain to use that domain as an argument to
the HELO/EHLO (and possibly - definititely allowed - for any host in a domain
to use the domain name as the argument to the HELO/EHLO) .  Also, note that
an 'A' record isn't required (though it is recommended) - see section 4.1.1.1
and note that both sendmail and postfix will accept a "resolvable" domain as
defined there (i.e. at least one 'MX' or 'A' record, and it need not match
the actual client's IP address).

        You also have the problem of dealing with IP literals, and users
running dynamic DNS which still has stale DNS data (so the response should
be a 4xx code not a 5xx code, if you do something like this).  If you use
an SA rule, the score should be fairly low.  As an example, recent mail I
have exchanged with [EMAIL PROTECTED] has used escalate.hk.outblaze.com
as the argument to EHLO, but the rDNS resolves to escalate.outblaze.com, and
they *certainly* are not spammers (notice also, that both names resolve in
different ways, but to the same IP address).

        Paul Shupak
        [EMAIL PROTECTED]

Reply via email to