> Bob Proulx wrote:
>> The following header line:
>>
>>  Received: from static-96-254-126-11.tampfl.fios.verizon.net
>>  [96.254.126.11] by
>>          windows12.uvault.com with SMTP;   Wed, 12 Aug 2009 08:26:40 -0400
>>
>> Hits the HELO_DYNAMIC_IPADDR rule.  I tested it this way:
>>
>>   $ perl -le 'if ("static-96-254-126-11.tampfl.fios.verizon.net" =~ 
>> /[a-z]\S*\d+[^\d\s]\d+[^\d\s]\d+[^\d\s]\d+[^\d\s][^\.]*\.\S+\.\S+[^\]]+/) { 
>> print "Yes" } else { print "No" };'
>>   Yes
>>
>> But the address doesn't appear to be in a dynamic block.  And it
>> doesn't look like a dynamic address pattern to me.

On 18.08.09 05:37, Michael Scheidell wrote:
> says 'static', but, a serious question:  is the mail server at that ip  
> REALLY setup with a FQDN of
>
> static-96-254-126-11.tampfl.fios.verizon.net

another serious question: should IPs with statically assigned IP addresses
get the same processing as if they were dynamically assigned?

I don't think so. Dynamic IP addresses are often in dynamic blacklists and
other blacklists don't have value there, since spamming clients may reconnect
and get other IP.

> the helo_dynamic_ipaddr rule also catches 'static' ip addresses used by  
> spambots that are operating on static workstation ip addresses.
>
> if this is a client of yours, you might help them get a VALID RDNS and  
> setup the FQDN for their mail server.
> (more likely, its a zombie spambot anyway, )

Of course it's much better to have personalised DNS name than generic one,
but *DYNAMIC* should still not match, becausse the ip is just not dynamic.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
10 GOTO 10 : REM (C) Bill Gates 1998, All Rights Reserved!

Reply via email to