Jo Rhett writes:
> Justin Mason wrote:
> > Jo Rhett writes:
> >> Justin Mason wrote:
> >>> do you mean the one I posted about earlier, or the original?
> >> Sorry, I haven't looked at it in a while and wouldn't remember.
> >>
> >> Looking at yours - why don't use use the global parameters that specify 
> >> trusted header hosts instead of adding your own?  I can't think of a 
> >> time I would trust the headers from a host, but wouldn't trust it for 
> >> bounces...
> > 
> > Tried, and it didn't work. :(  Unfortunately, trusted_networks etc.
> > is built on the IP address of trusted net ranges -- and that info
> > doesn't appear reliably in most bounce DSNs.   (I think there's
> > a bugzilla item with more info.)
> > 
> >> Also, I think (I don't have time to read the ruleset in detail right 
> >> now) that it seems a bit harsh.  The goal would be to identify only 
> >> backscatter right?  It seems likely to hit almost every bounce, yes?
> > 
> > it'll hit every bounce, and the MY_SERVERS_FOUND rule then rescues
> > the "legit" bounces from that set.
> 
> yeah, I thought so.  It seems too simple for anything but single-domain 
> servers. (or at least single-organization servers)

why?  Can you not simply list all the outgoing relays for the
organizations/domains, or even a pattern that matches all of their
names?  How many outgoing relays do you have?  (I'm not sure I
understand the problem here.)

> I'll poke at it later and see if I can think up a better way to handle 
> this.  I'd include SPF results etc if I can reuse that information from 
> the previous tests...

That would be nifty, if possible.

--j.

Reply via email to