Hmmm. I worry just a little about the precepts of this thread. I suggest you can count on the fingers of one hand the number of RBLs good enough for widespread use to truly regulate the acceptance of email. But, for example, if an IP is listed with xbl.spamhaus.org, which tracks verified spammers, spam gangs and spam services of about 150 criminal gangs and individuals, I don't even want that connection, never mind mail traffic. That's a BLACKlist There may be two or three others you can trust. Then there's as many as another hundred RBLs out of which ten might be good GREYlists (for fear of too many false positives) but not a criteria for regulating the acceptance of mail.

Any methodology which passes mail through SpamAssassin for the purpose of 'Realtime Blackhole List' matching *after the MTA has accepted* the message is a defacto 'GREYlisting' process. SpamAssassin by default adds a score of 2 on a match. If you only want grey listing, use SpamAssassin's URIDNSBL filter later in the mail delivery chain after the MTA accepts the message. Whitelist your most trusted sender domains, just in case.

If you want a BLACKlist process, the immediate rejection of UCE is the most desirable action on a trusted RBL/DNSBL/URIDNSBL (RBL) positive match. The ideal place to do the reject-on-RBL-match is at the initial MTA SMTP connection -- reject the mail with a permanent failure code (5** response) in the first SMTP transaction. You can still use a white list in the MTA.

Generally MTA's handle RBL lookups with more flexibility than does SpamAssassin. Nevertheless, SpamAssassin integrated into the MTA with a Milter ( like MIMEDefang (Sendmail) ) is a good implementation to exploit SpamAssassin's many features and Plugins including URIDNSBL because this integrated method allows instant reject-on-match. ( http://wiki.apache.org/spamassassin/IntegratedInMta ).

If you do your RBL lookups after the MTA has accepted the message, you will be compelled to deliver somewhere, store, or destroy the UCE . Unless you do an SPF / Domain Key check on the message sender at this point (after the MTA has accepted the message), *you must not bounce the message* or you have configured a system to SPAM new victims. Conceivably, if your system received 120 spoofed-sender SPAMs-per-user a day, with just 1000 users your system could become an aggressive rogue sending 120,000 UCEs and or virus/worm-laden mails daily. Yikes. DBMail postmasters are the best tribe of mail people on the planet and don't make mistakes like that, eh. :o) (Note: 'Bouncing' not to be confused with 'redirect with headers' http://wiki.apache.org/spamassassin/ResendingMailWithHeaders. )

Currently the IP [213.214.98.20] is *only* on the SpamCop RBL.Hopefully it drops off in a day or so. I like Paul's suggestion, not using SpamCop as an RBL. I see SpamCop more as a GREY list --- but other people swear by SpamCop and it is indeed a valid and well-maintained and widely acknowledged RBL if not brutally strict. For the latter folks who favour SpamCop, using Postfix as an MTA, I offer a suggestion to allow you to both use SpamCop for DNSBL lookups and still get your DBMail.org list mail even while SpamCop believes [213.214.98.20] to be a little SPAM-Meister :o).

Add the following to /etc/postfix/main.cf as a smtpd_recipient_restrictions *before* your RBLs

"check_sender_access hash:/etc/postfix/whitelist"

where whitelist is a hash made from running the postmap command against a whitelist file (i.e.: "postmap /etc/postfix/whitelist" )

#  my Postfix whitelist file containing domains
#  I want to receive mail from
#  come hell or high water
@dbmail.org                       OK
@myotherLIST-servers.org    OK

EXAMPLE:
smtpd_recipient_restrictions =  permit_mynetworks,
reject_unauth_destination,
check_sender_access hash:/etc/postfix/whitelist
reject_rbl_client bl.spamcop.net,
reject_rbl_client sbl.spamhaus.org,
reject_rbl_client xbl.spamhaus.org

OR if you are already using DbMailAdministrator's (http://dbma.ca ) MTA feature configured as per the instructions, all you need to do is add "@dbmail.org" as the domain and "OK" as the 'action' using the the MTA Access window. (See http://dbma.ca/demo/dbmailadministrator/DBMA_help.htm#use_DBMA_MTA_Domains)

It is generally difficult to keep *any* list server out of RBLs from time to time because some members' MTAs are occasionally misconfigured and do misdirected bounces; or someone on the list is testing a run-amok autoresponder. ( http://www.spamcop.net/fom-serve/cache/329.html )


best...
Mike








----- Original Message ----- From: "Jesse Norell" <[EMAIL PROTECTED]
To: "DBMail mailinglist" <[email protected]
Sent: Tuesday, February 07, 2006 7:11 PM
Subject: Re: [Dbmail] dbmail list server on spamcop, messages blocked


On Tue, 2006-02-07 at 16:04 -0700, Jesse Norell wrote:
Or rather, use it more intelligently.

Sorry, that was probably worded poorly.  I meant that Spamassassin can
do make more intelligent use of the rbl match than your mta which can
only outright reject the message.  That was not at all meant as an
insult or anything of the sort.


Eg. use spamcop to check that

And this ^^^^^^^  should have read spamassassin, not spamcop.


Jesse



rbl, so it increases your spam count, not completely rejecting the
message at the mta.
[

On Tue, 2006-02-07 at 23:03 +0100, Paul J Stevens wrote:
So don't use spamcop <duck>


Gregory S. Youngblood wrote:
I'm in the process of implementing new spam protections on my server.

I noticed that messages that appear to be from the dbmail.org list are
being bounced.

reject: RCPT from elnino.fastxs.net[213.214.98.20]: 554 Service
unavailable; Client host [213.214.98.20] blocked using bl.spamcop.net;
Blocked - see http://www.spamcop.net/bl.shtml?213.214.98.20

Thanks,
Greg

_______________________________________________
Dbmail mailing list
[email protected]
https://mailman.fastxs.nl/mailman/listinfo/dbmail


--
Jesse Norell - [EMAIL PROTECTED]
Kentec Communications, Inc.

_______________________________________________
Dbmail mailing list
[email protected]
https://mailman.fastxs.nl/mailman/listinfo/dbmail

Reply via email to