-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

List Mail User writes:
> >Theo Van Dinter writes:
> >> On Mon, May 23, 2005 at 06:45:12PM -0500, [EMAIL PROTECTED] wrote:
> >> > Here's the algorithm:
> >> > 
> >> >   1  Decode any URL-encoding in the message
> >> >   2  Un-MIME the message
> >> 
> >> Wrong order?
> >> 
> >> >   3  Scan all parts of the message for URLs and email addresses (this 
> >> > can be
> >> > links, IMG tags, mailto:'s, or even just something that looks like a web
> >> > address or email address).  Do NOT scan the headers.
> >> 
> >> get_uri_list().
> >> 
> >> >   4  For each address, resolve the hostname to an IP and then look up 
> >> > that IP
> >> > in your favorite DNS RBL - I use "sbl-xbl.spamhaus.org" as it caches the 
> >> > most,
> >> > but you can also add bl.spamcop.net and relays.ordb.net
> >> 
> >> SURBL?
> >
> >A bit more like URIBL_SBL, although in URIBL_SBL, we use the NS of the
> >domains (because they're harder to switch to new servers in the spammer
> >shell-game style).
> >
> >We did actually have an "A of domain name" test during 3.0.0 development,
> >I think, but dropped it for various reasons:
> >
> >- - if a spammer were to use a hostname like
> >  "jm_at_jmason_dot_org.spamdomain.com", they get a free backchannel to
> >  verify that I was (a) using SpamAssassin to filter to my mail, and (b)
> >  that that address is valid.  So blindly resolving the full hostname was
> >  judged as unsafe.   However, replacing hostname portions with another
> >  token is not useful: assuming that "jm_at_jmason_dot_org.spamdomain.com"
> >  will have the same A as "spamdomain.com" or "www.spamdomain.com" is
> >  naive and easily evaded.
> >
> >- - more importantly, the results weren't very good. ;)   Not as good as
> >  URIBL_SBL and the SURBL rules, at least.  iirc, the hits mapped very
> >  closely to URIBL_SBL, esp since Spamhaus explicitly list nameservers of
> >  spammed domains.
> >
> >The details should be on bugzilla somewhere.
> >Thanks anyway though!
> >
> >- --j.
> >-----BEGIN PGP SIGNATURE-----
> >Version: GnuPG v1.2.5 (GNU/Linux)
> >Comment: Exmh CVS
> >
> >iD8DBQFCkm5RMJF5cimLx9ARAgdbAJ9ji51PEG0MDlZc3XkG04JepiP6tQCdHhq6
> >xzicut+LZT7YmjyaZmQmCdg>=U4oZ
> >-----END PGP SIGNATURE-----
> >
> >
> 
>       A similar idea, without the "back-channel" flaw is to test the
> domain for either 'CNAME' or 'A' record `wildcards' (as in the command
> "dig '*.spammer_domain.tld' a" and "dig '*.spammer_domain.tld' cname").
> This is an excellent spam sign (the host portion of the name is often
> mapped back into a database to determine the actual recipient).  Legitimate
> domains will use wildcards for 'NS', 'MX' and even occasionally for some
> more obscure records, but an 'A' or 'CNAME' record is nearly always a
> spammer.
> 
>       Check this out with any spam you've gotten with a hostname other
> than "www" (about 70% of what I see).

ooh, interesting trick, thanks Paul!   have you got any idea of
how much spam hits this?

a great way to make life harder for spammers ;)

- --j.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Exmh CVS

iD8DBQFCknqJMJF5cimLx9ARAjP/AJ9MI1R577iNtzrs1nWWuT4IgX05yQCfROq/
qMMm1iD9xxIP6g4rEV9/mxw=
=JOJg
-----END PGP SIGNATURE-----

Reply via email to