Justin Mason wrote:
Jeff Koch writes:
From what I've seen the VBounce ruleset catches ALL backscatter and does not distinguish between legitimate bounce-backs and bounce-backs of emails with forged return addresses - which basically makes it useless for filtering out joe-jobs.

VBounce should be matching the forged name of the orginating mailserver against the IP address of the originating mailserver.

If you set whitelist_bounce_relays, that's exactly what it does.

...then I'm not getting it. I just forged an email from myself from an Internet host separate from our work one, to a bogus recipient on a Qmail server I own (where I turned off recipient checking). The server accepting my forged email and generated a bounce. It went back into our work network (where I have Vbounce enabled and whitelist_bounce_relays set), and none of the BOUNCE vars triggered.

Running it through "spamassassin -D" shows vbounce loading and __HAVE_BOUNCE_RELAYS triggered - but neither MY_SERVERS_FOUND, VBOUNCE_MESSAGE nor ANY_BOUNCE_MESSAGE triggered.

Unless there's a bug (this is SA 3.2.4), I can't see how this will work to detect forged mail causing bounces???

--
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1

Reply via email to