>>From [EMAIL PROTECTED] Tue Mar  1 22:15:46 2005
>Mailing-List: contact [EMAIL PROTECTED]; run by ezmlm
>...
>To: List Mail User <[EMAIL PROTECTED]>
>Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
>Subject: Re: another request for RECEIVED[x] array
>References: <[EMAIL PROTECTED]>
>In-Reply-To: <[EMAIL PROTECTED]>
>Content-Type: text/plain; charset=ISO-8859-1
>Content-Transfer-Encoding: 7bit
>X-Virus-Checked: Checked
>
>On 3/2/2005 12:33 AM, List Mail User wrote:
>
>> you can do whatever you like, I'd recommend at least doing more than just a
>> simple check for the names being identical
>
>I don't care if the names don't match (although somebody else might). My
>goal with this particular lookup is to weight identifiers that don't have
>any reverse DNS, that is all. Postfix supports this internally already but
>there are way too many FPs for these checks, there are too many possible
>errors (including delegation burps), and so forth. Given that SA is
>supposed to be about managing probabilities ... seems like a good place to
>do the checking is inside SA.
>
>Same thing goes for SMTP versus ESMTP. If they are using HELO they are
>probably malware, and I'd like to be able to test on this.
>
>I'd like to be able to poke at TLS data so that I can assigne a negative
>weight, since functional TLS is a good indicator of a well-managed network
>(not proof, but again, we are talking about probabilities)
>
>
>-- 
>Eric A. Hall                                        http://www.ehsco.com/
>Internet Core Protocols          http://www.oreilly.com/catalog/coreprot/
>
        Eric,

        It all sounds good to me, especially if you go beyond the MTA's
checking of the last relay only and check the full `received' chain;  I
find most of the spam that gets past my first level of filtering does so,
because it targets a high numbered/back-up MX not directly under my control;
Thus my servers, for those cases, see a perfectly acceptable client/EHLO
match (coming from a "trusted" host, though not in the SA sense - it is a
'MX' for my domain(s)), despite an obvious mismatch one level back.  Still,
I personally will leave the Postfix checks in place (I have them skipped
for some accounts, but very few - same thing for the black lists; But my
"extremism" has been a topic on this list before).

        Oddly, and probably out of habits over twenty years old, when I
connect to servers "by hand" (which I do quite often), I almost always
type "HELO", not "EHLO".  I have noticed that SMTP scanners usually scan
using HELOs instead of EHLOs and about 1% of my connections get dropped
due to improper pipelining following a HELO (after a EHLO, pipelining is
generally allowed).  I don't generate exactly the stats you might want,
but from my own reports I see ~3.5% of connections dropped voluntarily
(i.e. by the client, not by me) dropped immediately after a connect,
~0.65% after an EHLO and ~1.05% after a HELO;  I would interpret this as
scanners (who do anything beyond checking for a connectable port) are using
HELO over EHLO at about a 3 to 2 ratio:  I am sure that your supposition
about most HELOs being malware is likely correct, I doubt there still exist
many unpatched SunOS servers in production enviroments.

        Bye,

        Paul Shupak
        [EMAIL PROTECTED]

Reply via email to