On 9/24/2024 10:10 AM, Matus UHLAR - fantomas wrote:
I understand this case as "abusers" instead of users.
One man's use is another man's abuse. Limits are reached and False
Negatives are produced by DNSWL.
Here's the actual use case:
1) Stefan's a web guy. He hosts his stuff at ScalaHosting.
2) ScalaHosting provides a one-click install of SpamAssassin.
3) Stefan doesn't know what DNS that SpamAssassin instance (think like a
CloudWays App, or Digital Ocean droplet) is using. It could be a
public DNS; could be ScalaHosting's DNS.
4) ScalaHosting does offer their own mail servers for use for a fee.
Now maybe that has functional DNS, we don't know, but Marketing/Sales
being what it is, it is probably not a good sign for Stefan.
5) Stefan doesn't know all these particulars (#1 above). He just knows
it doesn't work.
Root Cause Analysis (in order):
1) DNSWL does not provide blocked codes. That deviates from most
DNS-query based systems.
2) ScalaHosting provides a "buggy" semi-functional package to their clients.
3) SA, being just a messenger, accurately reports the bogus False
Negative from DNSWL.
Risk Analysis:
1) Anybody that's seen DNSWL's zone files knows that it is a useless
arbiter of spamminess; not to mention the stale data therein.
2) SA default scores are tuned to 5, all instantly wiped out by a False
Negative score of -5.
3) "One-Click" install packages are becoming more and more common with
Cloud providers.
Market Influences:
1) Contraction in the Email services market; less "systems" expertise is
available.
2) DIY installs also "dumb-down" systems knowledge requirements.
3) SA has a desire to provide some protection in a default installation.
4) Migration to Zero-Trust environments.
5) Integration of DNS into O/S (like the stub resolver problems in
Debian/Ubuntu) - can't just slap BIND on a machine anymore.
I am 100% FOR dropping DNSWL, any way it is done, although I don't have
any problem with the existing handling of BLOCKED responses from
Validity, SpamHaus, and others. It *seems to me* that DNSWL-type
services are better used as overrides at SMTP-time to DNSBL blocks.
Doing that is a legitimate choice by a reputation service, but it's
not one SA can endorse. The fact that it is enforced by whim rather
than mechanically is not a positive factor.
Is there any possibility to detect clients using open DNS, perhaps
other than RCVD_IN_ZEN_BLOCKED_OPENDNS ?
Then, block all dnsbl/rhsbl rules?
I don't see any truly viable solution without conducting other lookups
first. A possible alternative would be to configure an unrestricted
open DNS server that returns to the client, in response to a query, the
IP address of the DNS host from where the query originated. Sort of
like the old, never-used, TCP Echo service.
Of course, the devil is in the details. But I like your thinking Matus
:) My mind is about as sharp as a cooked linguine noodle. I'm sure
there are a lot of people out there that can conjure up better solutions.
-- Jared Hall