What about the users (like me) that have one ip address to play with? Do I use the ONE ptr record for mail, web, dns, ftp or whatever else I choose to make available to the world. Generally, only mail has a loose 'requirement' for front to back dns a/ptr records, but back in the day, so did ftp servers for the client side. So, if I choose to advertise my PTR as fw.domain.name, you consider my mail server suspect, unless it was advertised as fw.domain.name? Just because I don't have an easy way to provide 10's of addresses to the world?


My system is secured and my ISP reserves the right to scan the ip space they provide (and they do check) for a number of 'questionable' or worse servers/services and disable those ips until repaired. That may or may not be the case for other ISPs, but I shouldn't have to use my ISPs servers, just 'cuz I can't have 10's of ip addresses.

Some of us do this internet thing for fun and not for profit. If I am causing you problems, contact my ISP or blacklist my ip. I use Sendmail, Spamassassin, ClamAV and milter-greylist. Works well enough and if there is a server that is sending me things I don't care to get, I just add them to my private rbl list. No more mail. Might not work for a corporate server, but it works great for me. Takes time, yes. Impose restrictions on legit mail servers.? NOPE. Until SPF or cost based email systems get accepted, you'll have to be creative in your filtering of mail.


Punish the 'criminals' not the responsible persons.

Eric Wisti

On Tue, 17 May 2005, [EMAIL PROTECTED] wrote:

Date: Tue, 17 May 2005 12:06:53 -0700 (PDT)
From: [EMAIL PROTECTED]
Reply-To: ClamAV users ML <[email protected]>
To: ClamAV users ML <[email protected]>
Subject: Re: [Clamav-users] sober.p and german adverts?

On Mon, 16 May 2005, Bill Taroli wrote:

Matt Fretwell wrote:
plenty of legitimate MTA setups running on dynamic IP's. [...] What
really does amaze me though, is that these are generally the admins who
will turn around and say, 'Don't block (variable), you will lose too
much legitimate mail'. Where is the logic in that? They will allow a
crappily configured multinational corporation or ISP to connect, yet not
give dynamics the slightest chance to prove their reliability.

I don't think it's a matter of reliability... it's more an issue of
accountability and traceability. How can one trace back to a dynamically
IP'ed MTA when it's dynamic? DynDNS doesn't prove itself in the majority
of cases, or isn't even used. Some of these are even worse because the
mail is coming from a NAT'ed host from behind a dyn IP firewall, which
won't even allow return messages -- and I suspect this is extremely
common. Kind of like an inverse roach motel for email.

I don't disagree that there may well be many people running wholesome
MTAs on dynamic IP's that suffer for the rest. But it's that rest we're
all concerned with. I honestly wonder whether an authorization framework
such as SPF would be the salvation of such setups... permitting them to
prove themselves worthy without the need for static IP addresses.

But until that time comes, any host who appears to lie about it's
identity by giving a host name that doesn't match it's visible IP
address is getting the door slammed in it's face by my MTA.

Once upon a time, email was simple. It carried text. Later people got smart and started UUEncoding binary data into emails and other proggies like shar (still text) were born to transfer data across email. Since then, email has blown up and we have lost much of the MTA standardization which existed when during a younger Internet. The encoding mechanisms (base64, etc) are all RFC standards and MUA's follow them, but the MTA's need to be setup a little bit stricter. Requiring forward-and-back dns lookups is a good idea if everyone would cooperate. Back in the early 90's, most addresses would forward-and-back dns lookups and certainly all MTA's or servers offering a real service (http/ftp/rdiff) did.

It seems that we have moved away from a consistent Internet with rules
which were followed as a courtesy to sysadmins.  We have now moved into a
much more liberal (broken?) Internet where we try to make anything go and
still have it function.  Remarkably, it does for the most part despite
all the garbage that floats across the line (just tcpdump a cable line
sometime and see whats there).

For email transfer and MTA's alike, putting SPF in DNS to help
"authenticate" the source is a step in the right direction.  If SPF is a
good idea, and it is dns based, then so should forward-and-back lookups.
If additional mail standardization can take place (again) then spam can be
reduced to a certain degree.  I much like Brian Read's idea of blocking
mail xfer from sites which are not authenticated (SASL) or who cannot give
a proper reverse lookup.  Every ISP we have worked with have been happy to
create or change a PTR entry in their dns, even if it took a lot of work
to get the ISP to do so (I even offered to do it for one isp and they
finally did it themself).

If we can standardize the set of rules and protocols required for an MTA
to accept an email, then spam will reduce.  Either that or we need to
build a better mousetrap. This is jut my $0.02.

Your thoughts?

-Eric


-- Eric Wheeler Vice President National Security Concepts, Inc. PO Box 3567 Tualatin, OR 97062

http://www.nsci.us/
Voice: (503) 293-7656
Fax:   (503) 885-0770

_______________________________________________
http://lurker.clamav.net/list/clamav-users.html


_______________________________________________ http://lurker.clamav.net/list/clamav-users.html

Reply via email to