On Fri, May 22, 2009 at 9:06 AM, McDonald, Dan
<dan.mcdon...@austinenergy.com> wrote:
> On Fri, 2009-05-22 at 14:14 +0200, Arvid Ephraim Picciani wrote:
>> Greetings.
>> I'm thinking of implementing:
>> - greylisting
>
> very effective.  I cut my incoming mail by about 80% when we put up
> greylisting.  I'm using sqlgrey.
>
>> - honeypots
>> - rejecting broken HELO at smtp time  (such as  "MUMS_XP_BOX")
>
> We had too many false-positives when I did that.  In particular,
> Exchange administrators sem to be completely incapable of setting the
> HELO name to something sane.
>

Although I would agree with that a couple years ago, in the past
several months I have been scoring very high on retarded HELO names
with good results.  I think the tide is turning, more and more admins
finally getting a clue and more sites blocking or scoring highly on
misconfiguration.  I may start blocking at the MTA, the score I'm
giving is essentially a block already.

>> - rejecting dynamic IPS at smtp time (PBL)
>> - firewalling hosts  with 100% spam,  forever.
>
>
>> I'm getting lots of it from zombies, so i wonder if its legitime to scan
>> the sender before accepting. For example if it blocks icmp,  its very
>> likely a home router.
>
> Any sane enterprise server administrator will block external icmp.
> I would recommend that you use p0f and a tool like BOTNET.pm to detect
> zombies - if they have messed up DNS and are running Windows, then it's
> a bot...
>
>>  But i have no data on that, and no clue.
>> Spamhaus has only about half of the zombies. PBL even lacks half of the
>> german dialup ISPs. i'm thinking i need my own techniques to build such
>> lists.
>>
>> thanks.
> --
> Daniel J McDonald, CCIE # 2495, CISSP # 78281, CNX
> www.austinenergy.com
>

Reply via email to