>...
>
>There's a rule NO_DNS_FOR_FROM which checks for an A or MX record for
>the sending IP, but no similar rule checking for PTR (reverse DNS)
>entries - and it's not clear to me why not.
>
>Anyone able to enlighten me?
>
>=20- steve
>
>PS: I'm aware that these checks are often used at the MTA level to block
>- but from bitter experience I know that that's not really always a good
>idea - I'd rather just bump up the SA score a bit for such senders.
>
>...
        Only a guess, but the existing rule does check the "sender", you
may or may not mean what you are saying - the more expected rule would be
to check the "client" for rDNS (and even FCrDNS).  Remember, there are
at least three parties in a SMTP transaction, the sender, the client and
the recipient.  The sender is the easiest to forge.  Sites like AOL and
myself reject mail when the client has no rDNS.  Unlike some people, I
would mind too much a low scoring rule for sender rDNS - even though I
don't have any (i.e. the domain this is sent from uses servers configured
with MX records, but the sender has no A RR - now the client I send from
does have FCrDNS - simply rDNS that matches the forward DNS).  Still I think
what you mean to ask for is a rule for client rDNS as that is the typical
case checked for at the MTA level, but you might have meant just what you
said and want a sender check (the existing rule and one like that still
won't do any good for forged senders - it is hard, but not impossible to
forge the client, but too slow a process for most spammers - but if you
are trying to joe-job someone...).

        Paul Shupak
        [EMAIL PROTECTED]

Reply via email to