Am 24.10.2014 um 15:12 schrieb Paul Stead:
Being UK based we get a lot of email from these connections.

I've just done a quick check and we get a lot of (seemingly) legit email
from servers with generic BT PTRs - how wide spread is rejecting email
based upon generic PTR rules?

don't know how widespread, what i know is if that would be enforced more widespread 90% of spam sent from hacked customer PC's would disappear and the combination with RBL-scoring kills most junk before SA

in the end it is safer than block IP ranges because everybody get such a reject only needs to call his ISP and order a PTR matching his hostname - the rest is still rejected

stats from the current month
Connections:       401569
Delivered:         59683
Blocked:           341886
Invalid User:      7552
Disallowed User:   2
Reject Postscreen: 299255
Reject Postfix:    15568
Reject Milter:     5883
Reject Temporary:  1686
Blacklist:         295208
Pregreet:          17672
Protocol Error:    2323
Spamfilter:        5507
Virus:             371
Helo:              664
Subject:           41
Attachment:        9
Sender Blocked:    544
Sender Invalid:    823
Sender Spoofed:    635
Sender Parked:     33
PTR Missing:       3954
PTR Generic:       864
SPF:               491

that you shoud take care of your PTR is common sense at least for 8 years, hence the reject message with links

for such a generic PTR you hit a lot of SA rules anyways

On 24/10/14 13:52, Reindl Harald wrote:

Am 24.10.2014 um 14:34 schrieb Joe Quinn:
On 10/24/2014 7:25 AM, Paul Stead wrote:
Not sure if this is a legit listing, however it's causing problems for
some of my user base.

I've added btconnect.com to my uridnsbl_skip_domain list

Nothing legit came up when we were spot-checking the domain, but
apparently it's the public mail domain for British Telecom...

Should now be fixed

their dialup-stuff has PTR's like
host81-130-209-129.in-addr.btopenworld.com

that's better catched with "check_reverse_client_hostname_access"
because from the moment it's a legit server with a sane PTR any host
can be excluded while compromised endusers still get blocked without
the ressource usage of a contentfilter

/^host[\.\-]?[0-9]{1,3}[\.\-][0-9]{1,3}[\.\-][0-9]{1,3}[\.\-][0-9]{1,3}[\.\-]?in[\.\-]addr[\.\-]btopenworld\.com$/
REJECT Generic DNS-Reverse-Lookup (PTR-Rule: 97) see
http://www.emailtalk.org/ptr.aspx and
https://www.ietf.org/rfc/rfc1912.txt

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to