Am 02.09.2014 um 22:32 schrieb Ted Mittelstaedt: > On 9/2/2014 4:59 AM, Reindl Harald wrote: >>> just get a proper MTA, enable debug logging >>> and watch the commands / responses between >>> client and server due a message transmission >> >> and to make it clear for you: >> >> until after end of data itslef is responded with success >> the message is *undelivered* and tried again from the >> sendig client if it is a proper MTA >> > > However you have GIVEN THE SPAMMER AN OK that they have a > valid victim address. You had to issue an OK to the > RCPT TO: to get that DATA from them. You just told them "you > got a good email address"
child you do not realize that all you claim below has nothing to do with SA, nor did you understand how a *layered* spam protecton works nor did you try to understand *anything* i explained you so what - otherwise i had even accepted the message as you do your setup: * not on RBL * accept it and drop it silently because the score * issue "250 OK i even took the whole message" * how do you think you don't leak the RCPT case * frankly with the 250 OK you invite to send more spam my setup: * not on a RBL * reject it * don't issue "250 OK i even took the whole message"" * if it was not a spammer trigger a bounce on the senders server so that he don't think it was successful delivered and can even prove it by logs >> if your MTA *don't repsond with success* at END-OF-DATA >> the message implicit is counted as *not delivered* because >> simply in the middle of data the server could raised >> an error by a full disk or something else > > Yes and the spammer just tries again. And again. And again, > forever and forever. so what - what has that to do with anything i explained and you refuse to understand over the whole thread? > The point of blocking on DNS or IP based blocking is to issue > that error 5xx because that is the ONLY thing that is going to > cause the spammer to delist. Because at that point they are > now wasting money and time and resources attempting to deliver > to an address that probably does not exist. so what - that one was not on a RBL and now? accept the spam message or *reject* it? i at least reject it you accept it, say "250 OK" and then drop it silent > Sure they can parse the return code, looking for polite language > saying something to the effect "this email is being blocked because > you are on Wonkulating Gronkluator's blacklist" that some sites > issue to "help" newbie Postmasters realize that their mailserver > is being hijacked, or something of that nature. what has that to to with the topic? > But they GUESS so many of their victim addresses that they > can't spend the resources doing that on a dictionary attack, > they KNOW that 99.99% of the error 5xx's they get back are > for User Unknown. So the few times they guess a real address > and get that polite human-readable explanation that they are > on a blacklist, gets lost in the noise. what has that to to with the topic? > But YOUR setup - why that's spam flypaper. Because, YOU are > NOT issuing an error 5xx on a sender IP that happens > to guess one of your users email addresses - because your just > too curious to get at the DATA and inspect the Subject: line. jesus christ - Subject is not data - subject is part of the header come back after you made it through *basic lessons* the client makes it to spamass-milter because he is *not* on the 15 blacklists in front of > Thus you are HELPING the spammers build a list of valid email > addresses on your domain. bullshit - i reject more than 90% like you but i don't issue "250 OK" for clear spam, i reject it > No wonder you have such spectacular spam counts. The spammers > must just love you. Your handing them over your user email > list. sorry, but you are an idiot i handle nothing because the accept of DATA only happens if the client is not listed on RBL's and so you better stop to spread bullshit just because you don't understand what people exlaining you by wasting time with your posts > Sure, you may determine they are operating from a blacklist > and shut them down after they throw you 1,000 guesses from an IP > address. But in so doing you have handed them 10 good addresses > that they will remember and just attack you from > somewhere else from bullshit again - more than 90% are rejected by postscreen and RBL's frankly postscreen can't leak valid addresses because it even don't know them - that information has only the smtpd process if you make it through RBL's and protocol tests > Do that a couple hundred times and they have thousands of your > valid emails. > >> so the communication looks somehow like: >> >> * client: i am sending now data >> * server: fine, do so >> * client: sending data >> * client: i have finished with sending data >> * server: ok, i accepted that >> * client: fine, QUIT >> * client: closes the connection AFETR QUIT you missed to understand to understand that the above communication *happens only* if the client *passed RBL checks* and also *passed* HELO checks and also *passed* a lot of other tests and until DATA was no other reason found to reject it before > Here is how yours looks: > > Spammer: HELO throwawayhostname.throwawaydomainname.TLD like .eu or .co > you: OK I did my DNS check, my RBL check, my PTR check and that's a good > host so go ahead > Spammer: MAIL FROM: <faken...@throwawayhostname.throwawaydomainname.tld) > You: OK > Spammer: RCPT TO <usernameofyoursthatijustgues...@oneofyourdomains.com> > You: OK looks good but I want to see your content, so start sending > Spammer to itself HOT DAM I GOT ANOTHER VALID EMAIL ADDRESS TO TORTURE FOREVER > Spammer to you: DATA, blah blah blah, Subject: Viakkagra > blah > blah > you: OK your content says your a spammer so I'm going to blow the > TCP connection and not send a final OK > Spammer to itself SUCKER!!!! IF HE THINKS I'LL FALL FOR THAT HE'S > DUMBER THAN A POST! I'LL JUST ATTACK FROM SOMEWHERE ELSE USING DIFFERENT > CONTENT UNTIL I GET PAST HIS BLOCK. BULLSHIT the communication looks like "postfix/postscreen[30894]: NOQUEUE: reject: RCPT from [187.163.175.185]:61326: 550 5.7.1 Service unavailable; client [187.163.175.185] blocked using RBL xyz" > And here is how it SHOULD look: > > Spammer: HELO throwawayhostname.throwawaydomainname.TLD like .eu or .co > you: OK > Spammer: MAIL FROM: <faken...@throwawayhostname.throwawaydomainname.tld) > you: OK > Spammer: RCPT TO: <usernameofyoursthatijustgues...@oneofyourdomains.com> > You to yourself: Hmm - looks like my user has a blacklist against .co so > this guy is unwanted > You to spammer: 500 User Unknown > Spammer: DAMN, I guessed wrong. Toss that one and go on to the next guess. > > Or even better: > > Spammer: HELO throwawayhostname.throwawaydomainname.TLD like .eu or .co > you to yourself: We block mail from Russian federation Mafia > you to spammer: error 5xx go to hell, spammer. End TCP connection. > Spammer: WTF just happened??? > > Granted, this isn't how SA works but you have been talking about prefiltering > and this is how it should look damned SA is not part of the whole game more than 90% rejects happening *before handover the connection to smtpd* and so *long before* SA comes in the mix at all >> so *please* refrain from reply and discuss about good >> or bad defaults until you learned your *basic sessions* why did you not follow the advice above?
signature.asc
Description: OpenPGP digital signature