Quoting Justin Mason <[EMAIL PROTECTED]>:

- - if a spammer were to use a hostname like
  "jm_at_jmason_dot_org.spamdomain.com", they get a free backchannel to
  verify that I was (a) using SpamAssassin to filter to my mail, and (b)
  that that address is valid.  So blindly resolving the full hostname was
  judged as unsafe.   However, replacing hostname portions with another
  token is not useful: assuming that "jm_at_jmason_dot_org.spamdomain.com"
  will have the same A as "spamdomain.com" or "www.spamdomain.com" is
  naive and easily evaded.

This is a good point, but honestly, they also know that you aren't likely to be
one of the users that clicks on spam and they won't be making much money from
you.   The method has shown to be effective enough that I don't care if my
email address is added to as many lists as they want to add it since I won't
see their spam anyway.

- - more importantly, the results weren't very good. ;)   Not as good as
  URIBL_SBL and the SURBL rules, at least.  iirc, the hits mapped very
  closely to URIBL_SBL, esp since Spamhaus explicitly list nameservers of
  spammed domains.

The results weren't good?   I actually had a discussion with Steve Linford at
spamhaus and they came up with a similar method themselves.  Their tests were
as good as mine - nearly 100% effective.

The details should be on bugzilla somewhere.
Thanks anyway though!

Are these the results from a few years ago? The only spam I get these days that
makes it through spamassassin is mail that would have been caught by the above
method.

I think its worth looking into again.

-- Evan Langlois



Reply via email to