On Friday 16 Dec 2005 10:30, Søren Therkelsen wrote:
> Hi,
>
> I'm not running a mail server but just a annoyed receiver of spam.
>
> It seems to me that a lot of spam is send through mail servers
> disguised a different mail server (possibly acknowledged as
> trustworthy)
>
> I get to that conclusion from reading the mailheader and comparing
> the "helo" from the originating mail server with the IP-address of
> the same.
>
> It might have been thougt of before and there might be good reasons
> for not making an identity check -
> but i would like your thought on this

This is probably why the SA installation contains a .cf file for fake 
HELO (20_fake_helo_tests.cf), and a lot of the rules for tests related 
to HELO/EHLO have fairly high scores:

$ grep HELO /usr/share/spamassassin/50_scores.cf
score FAKE_HELO_EMAIL_COM 1.440 1.440 1.665 1.335
score FAKE_HELO_EUDORAMAIL 1.360 1.440 1.665 1.705
score FAKE_HELO_EXCITE 0
score FAKE_HELO_LYCOS 0
score FAKE_HELO_MAIL_COM 1.920 1.920 2.220 2.369
score FAKE_HELO_MAIL_COM_DOM 2.160 2.160 2.498 2.700
score FAKE_HELO_MSN 2.080 2.060 2.358 2.509
score FAKE_HELO_YAHOO_CA 1.186 1.353 1.466 1.599
score FORGED_RCVD_HELO 0 0 0 0.135
score HELO_DYNAMIC_ADELPHIA 1.680 1.680 1.942 1.787
score HELO_DYNAMIC_ATTBI 2.400 2.400 2.775 2.692
score HELO_DYNAMIC_CHELLO_NL 1.624 0 2.035 0.170
score HELO_DYNAMIC_CHELLO_NO 0 # n=0 n=1 n=2 n=3
score HELO_DYNAMIC_COMCAST 2.800 2.800 3.237 3.500
score HELO_DYNAMIC_DHCP 3.280 2.664 3.792 3.066
score HELO_DYNAMIC_DIALIN 2.080 2.080 2.405 2.600
score HELO_DYNAMIC_HCC 3.280 3.280 3.792 4.100
score HELO_DYNAMIC_HEXIP 1.280 1.280 1.480 1.600
score HELO_DYNAMIC_HOME_NL 1.600 1.600 1.850 2.000
score HELO_DYNAMIC_IPADDR 3.360 3.360 3.885 4.200
score HELO_DYNAMIC_IPADDR2 3.280 3.213 3.792 3.818
score HELO_DYNAMIC_NTL 1.360 1.360 1.573 1.481
score HELO_DYNAMIC_OOL 1.840 1.839 2.127 2.012
score HELO_DYNAMIC_ROGERS 1.840 1.203 2.127 1.580
score HELO_DYNAMIC_RR2 1.440 1.440 1.665 1.605
score HELO_DYNAMIC_SPLIT_IP 2.880 2.880 3.330 2.191
score HELO_DYNAMIC_TELIA 0 # n=0 n=1 n=2 n=3
score HELO_DYNAMIC_VELOX 0 # n=0 n=1 n=2 n=3
score HELO_DYNAMIC_VTR 1.440 1.492 1.757 1.287
score HELO_DYNAMIC_YAHOOBB 2.240 2.240 2.590 2.800
score NO_RDNS_DOTCOM_HELO 0.356 0 0 0
score RCVD_FAKE_HELO_DOTCOM 2.160 1.652 2.590 2.281
score RCVD_HELO_IP_MISMATCH 3.200 3.200 3.700 4.000
score RCVD_NUMERIC_HELO 1.440 1.253 1.665 1.500
score SPF_HELO_PASS -0.001
score SPF_HELO_FAIL 0
score SPF_HELO_NEUTRAL 0
score SPF_HELO_SOFTFAIL 0 2.078 0 2.432

So yes, I'd say the devs have thought of this.

In addition, it's fairly common for spam sources to forge the name of 
the server they are connecting to as HELO/EHLO, so I had something like 
the following in Exim's smtp_helo ACL (for an old dyndns address which 
I no longer use), so they did't get as far as SpamAssassin:

# drop connections which try to helo as me
drop    condition =   ${if or{ \
                          {eq {$sender_helo_name}{$qualify_domain}} \
                          {eq {$sender_helo_name}{$interface_address}} \
                      }}
        hosts =       !$qualify_domain : !*.$qualify_domain
        message =     Liar. Go away.
        log_message = $sender_host_name \[$sender_host_address\] \
                      forged EHLO/HELO

-- 
Rob Skedgell <[EMAIL PROTECTED]>

Attachment: pgpaMJTVlg9vg.pgp
Description: PGP signature

Reply via email to