Len Conrad wrote:
It's obvious from above that verizon does not block outbound port 25 from their "pool" networks, which are badly infected with spam bots.
And their "static" nets are not totally clean.

So while hassling all of us with their weird mail policies, they also allow their infected pool $subscribers to hassle our MXs (subscriber-direct-to-MX abuse).
No doubt about that. We get thousands of Verizon zombies connecting to us every day. SenderBase.org shows 25,300 zombies active in the last 30 days that start with "pool" and end with verizon.net.

Regarding Sender Address Validation in general. I believe this is effectively the equivalent of Challenge/Response-lite. I already receive about 100,000 bounces to bad addresses per day that are backscatter from systems that accept messages without validating the recipient or who have broken forwarding. If everyone was to start to use SAV, could you imagine how many connections my system would be receiving each day from all the forging and dictionary attacks that go on? My guess is that this would increase my connection traffic by at least 10 times. If such a thing isn't appropriate for everyone to use, why should it be appropriate for anyone at all?

My mail servers are not there for Verizon to block their spam with, nor anyone else that wants to use SAV.

Yesterday we were connected to 898 times by Verizon to validate addresses, and 697 of those connections were for addresses that don't exist. To make matters worse, when they get a 550 for a bad address using a null sender, they RSET and try again using a named Mail From, so they actually tried bad addresses 1,394 times in just one day. Who has a right to pound a server with 1,394 bad addresses a day?

In looking at some newsgroups, I found that in at least November and December, they were sometimes connecting from IP's that had no reverse DNS entry. While that doesn't cause us issues, that results in some rejections of their probes by many gateways. I also found this list of instructions from their support:

   1.) Please ensure that your server is accepting mail from
   206.46.252.0/24.
   2.) Please ensure that your server accepts a Null Mail From: command
   e.g. Mail From:<>.
   *3.) Please ensure your mail server responds to the SMTP commands
   within 30 seconds.*
   4.) Please ensure the from address used is a valid email address
   that is accepted by the MX server for that domain.
   5.) Please ensure you have a proper MX record.

The RFC suggests that 3 minutes is reasonable, and to go all the way down to 30 seconds is really pushing it in a world where there is both tarpitting and many servers with performance issues due to spam.

They are doing RSET's and then using a unique address because of looping issues. For instance, if you send from a server protected by SAV to another server protected by SAV, it is possible that your servers will both demand the other verify their own address. It appears that to get around this issue, they are using special addresses in addition to the initial null sender. I'm not sure that everyone has a capability to do such a thing though.

After all is said and done, and if you fail their SAV, you reach some sort of limit with them and they blacklist your domain automatically.

Since these posts get archived and are google-able, please allow me to suggest that people not use Verizon for their E-mail needs whenever possible because it is likely that their sender verification mechanism will cause delivery issues, and because they are inappropriately using the resources of others.

Matt



Reply via email to