Terry Carmen wrote:
On 01/11/2010 05:22 AM, Jason Haar wrote:
Hi there

We've been getting a few of these leaking through in the past couple of
weeks.

http://pastebin.com/m574da717

They aren't triggering (enough) network rule matches, contain a
bayes-killer, and even FuzzyOCR can't manage the swirly image trick they
pull. Has anyone come up with a way to fight these? (I've actually added
all the phrases that occur in this image to FuzzyOCR - didn't help)
Unless you changed the headers, it looks like it came from an IP with no reverse DNS entry.

This is easy enough to stop dead in it's tracks at your MTA. If there isn't any reverse DNS, the chances of it being a legitimate mail server are pretty slim.


This is the WRONG way to do this - it amazes me that in 2010 on an
anti-spam mailing list that we have people making such statements.

The SMTP RFC 2821 does NOT mandate the existence of a PTR record for an SMTP sender. The DNS RFC 1912 also does not mandate a corresponding PTR for a mailserver hostname. Implies, yes, but there's no requirement. There is a very good reason for this.* Blocking at the MTA based on the lack of a PTR record is incorrect. The correct way is to assign a spam score in SA to hosts lacking a PTR, the same way you do to mail that contains HTML, etc.

Ted

* The reason this is NOT mandated anywhere is because if it was then
sites running multiple mailing domains on a single server could easily
overflow the DNS UDP packet space with a list of PTR's for the server - causing the resolver to exceed 512 bytes on the DNS UDP response, or
causing a switch to TCP - either of which can break some firewalls.
For example the Cisco PIX came standard out-of-the-box with a DNS
filter that blocked DNS UDP packets larger than 512.


Reply via email to