Is that your own webmail server (run by you, or run by a service you
use/trust/contract-with/etc.)?  Because, a webmail transaction
shouldn't go to the generic internet anymore than a desktop client
should, IMO ... so they're in the same boat as everyone else.

That host should go to their local MTA, and then to you (if they
aren't YOUR webmail servers).  If they are a combined Webmail and MTA
host ... then they're just as badly named as any other MTA with an IP
address in the name.  Plus, HTTP transactions are no more nor less
subject to manipulation than SMTP transactions.

If they ARE your webmail servers, then you should use existing options
about trusted networks, Botnet's exceptions for skipping or exempting
certain IP's, etc.  It's the same as if they were your own desktop
clients with dhcp based hostnames.

So, it would seem to me that the current tools already handle it, and
the specific nature of the request isn't any different from other
cases.  Does anyone think that's way off base?

The only thing I can think of is that (trying to remember what I wrote
many years ago), Botnet has an exemption for authenticated
submissions.  But, Botnet doesn't detect that natively, IIRC, it
trusts Spam Assassin to determine that.  That feature in Botnet just
honors that Spam Assassin said "it was authenticated".  So, if what
you're saying is "HTTP relays should be treated like SMTP-AUTH
relays", then I would say "I think that's a Spam Assassin issue, not a
Botnet limitation".  If SA is properly recognizing it, but Botnet
isn't honoring it, then let me know, and I'll see how I can add it to
the Botnet authentication exemption (assuming there's a way to tell
the difference between "Webmail" and "some cgi/php script", as I don't
want to automatically exempt the latter, I think).



On Wed, Jan 28, 2009 at 05:14, Andy Dorman <ador...@ironicdesign.com> wrote:
> We have found Botnet to be very helpful in trapping spam generated by
> misbehaving home computers and office workstations.  So we want to avoid
> making changes that could reduce it's effectiveness.
>
> However, we are having a problem with it also catching legitimate email sent
> from webmail hosts.  The "untrusted" relay that is triggering the test looks
> like this example.
>
> Received: from rbn1s-216-180-93-118.adsl.hiwaay.net
> (rbn1s-216-180-93-118.adsl.hiwaay.net [216.180.93.118]) by
> mail.homefreemail.com (Horde Framework) with HTTP; Fri, 23 Jan 2009
> 16:03:43 -0600
>
> And we can see what happens when we run in debug mode.
> ...
> [538] dbg: Botnet: starting
> [538] dbg: Botnet: no trusted relays
> [538] dbg: Botnet: Skipped ip 192.168.0.5
> [538] dbg: Botnet: get_relay good RDNS
> [538] dbg: Botnet: IP is '216.180.93.118'
> [538] dbg: Botnet: RDNS is 'rbn1s-216-180-93-118.adsl.hiwaay.net'
> [538] dbg: Botnet: HELO is 'rbn1s-216-180-93-118.adsl.hiwaay.net'
> [538] dbg: Botnet: sender 'andydor...@comehome.net'
> [538] dbg: Botnet: hit (client,ipinhostname,clientwords)
> [538] dbg: rules: ran eval rule BOTNET ======> got hit (1)
>
> What we would like Botnet to do is recognize that this is an HTTP
> transaction, not smtp, and hence not hit on it.
>
> We were first wondering if anyone else has encountered this issue and
> possibly there is a fix we are not aware of?
>
> Otherwise, we would be willing to give a shot at a patch to handle this
> issue.
>
> Just did not want to re-invent the wheel.
>
> Thanks,
>
> --
> Andy Dorman
> Ironic Design, Inc.
>

Reply via email to