On Wed, Aug 30, 2006 at 01:37:37PM -0400, Michel Vaillancourt wrote:
> > The short answer is that there's no way to do that in general, regardless
> > of SA, so no.
> 
>       There is a way to do it, but someone more skilled at PERL than I would 
> have to carve it...  you actually open an SMTP conversation with 
> "REMOTE_DOMAIN.com" a la:
> 
> RCPT TO: [EMAIL PROTECTED]
> 554 <[EMAIL PROTECTED]>: Relay access denied
> 
>       ...  trap that "5xx" return, and you know its a bogus sender.  The 
> plug-in adds 2 points to the score.
>       Get a "250 Ok" back, and you are likely "safe"... score 0.

That *may* tell you whether or not a sender is valid -- what if the server is
just blocking you?  What if there's a misconfiguration for a minute?  What if
RCPT TO works but it turns out the server would have denied you after DATA
instead?  What if the server is a relay which accepts all mails for a domain
regardless of whether or not the downstream server will accept it?  What if
the email address is not a user and only receives mails (ie: spamtraps, etc.)

There is no way to solve this definitively based on current protocols/etc.

You can try to make assumptions with things like VRFY (most people just
disable that), RCPT TO, etc, but it doesn't necessarily mean anything
wrt spam.

For instance, if I was going to spam people and a "sender verification" system
was in use widely, I'd just start using random addresses from my list to send
to other people -- if I paid attention to those that are accepted at RCPT TO,
versus those that don't, then I bypass your system trivially.

-- 
Randomly Generated Tagline:
"Klingon function calls do not have 'parameters' - they have 'arguments' -
 and they ALWAYS WIN THEM." - Klingon Programmer's Manual

Attachment: pgp6jI0yYqMrv.pgp
Description: PGP signature

Reply via email to