Matt Kettler wrote:
> Clunk Werclick wrote:
>   
>> Howdie;
>>
>> I'm starting to see plenty of these and they are new to us:
>>
>> zgrep "address not listed" /var/log/mail.info
>> Sep  3 05:26:59 ....: warning: 222.252.239.56: address not listed for
>> hostname localhost
>> dig -x 222.252.239.56
>>
>> ...
>> ;; QUESTION SECTION:
>> ;56.239.252.222.in-addr.arpa. IN PTR
>>
>> ;; ANSWER SECTION:
>> 56.239.252.222.in-addr.arpa. 83651 IN PTR localhost.
>> ...
>>
>> Taking to one side the various RBL's which are catching these, and not
>> going the whole 'PTR must match' route - would it be practical to craft
>> a 10 point rule based on PTR = localhost? Is it even possible to build a
>> rule based upon DNS returns?
>>
>> Forgive the stupidity of the question, but I'm not sure how to, or even
>> if it can be implemented?
>>     
> Not without writing a plugin. Although if your MTA inserts a "may be
> forged" note into the Received: headers, SA will pick up on this.
>   
Correction, SA dropped this rule a LONG time ago in the 2.5x series due
to wild false positives.

The legacy rule from 2.4x

header MAY_BE_FORGED            Received =~ /\(may be forged\)/i
describe MAY_BE_FORGED          'Received:' has 'may be forged' warning
score MAY_BE_FORGED                  0.038


OVERALL%   SPAM% NONSPAM%     S/O    RANK   SCORE  NAME
  2.530    3.757    2.290    0.62    0.34    0.04  MAY_BE_FORGED

0.62  S/O is not so good (ie: 62% of the email matched was spam, but 38%
was nonspam)

>
>
>   

Reply via email to