No doubt about that. We get thousands of Verizon zombies connecting
to us every day. SenderBase.org shows 25,300 zombies active in the
last 30 days that start with "pool" and end with verizon.net.
Regarding Sender Address Validation in general. I believe this is
effectively the equivalent of Challenge/Response-lite.
is that something real or a made up phrase. google doesn't know it.
I already receive about 100,000 bounces to bad addresses per day
that are backscatter from systems that accept messages without
validating the recipient or who have broken forwarding.
backscatter is a real problem, but has nothing to do with SAV.
If everyone was to start to use SAV, could you imagine how many
connections my system would be receiving each day from all the
forging and dictionary attacks that go on?
SAV should be done very selectively and last after all other filters.
the negative/positive SAV probe results should be cached.
My guess is that this would increase my connection traffic by at
least 10 times. If such a thing isn't appropriate for everyone to
use, why should it be appropriate for anyone at all?
opionions vary :)
My mail servers are not there for Verizon to block their spam with,
nor anyone else that wants to use SAV.
Yesterday we were connected to 898 times by Verizon to validate
addresses, and 697 of those connections were for addresses that don't exist.
To make matters worse, when they get a 550 for a bad address
using a null sender, they RSET and try again using a named Mail
From, so they actually tried bad addresses 1,394 times in just one
day. Who has a right to pound a server with 1,394 bad addresses a day?
1,394 compares to how many total msgs to your mail server, how many
were SPAM that you accepted/queued/scanned then deleted or
quarantined? ie, what was the increment of work to your mailserver
by Verizon SAV probes.
An SAV probe stops after the RCPT TO:, is probably 200 bytes total
transactions, taking under 2 secs.
In looking at some newsgroups, I found that in at least November and
December, they were sometimes connecting from IP's that had no
reverse DNS entry. While that doesn't cause us issues, that results
in some rejections of their probes by many gateways. I also found
this list of instructions from their support:
1.) Please ensure that your server is accepting mail from 206.46.252.0/24.
those are the "pub" PTR I mentioned in this thread:
for yesterday, our MXs saw these "qty connects from the PTR, PTR
[ip]" in that Class C:
36 sv10pub.verizon.net[206.46.252.146]
137 sv11pub.verizon.net[206.46.252.147]
126 sv12pub.verizon.net[206.46.252.148]
130 sv13pub.verizon.net[206.46.252.149]
145 sv14pub.verizon.net[206.46.252.150]
122 sv15pub.verizon.net[206.46.252.151]
124 sv16pub.verizon.net[206.46.252.152]
122 sv17pub.verizon.net[206.46.252.153]
112 sv18pub.verizon.net[206.46.252.154]
139 sv19pub.verizon.net[206.46.252.155]
145 sv1pub.verizon.net[206.46.252.137]
116 sv20pub.verizon.net[206.46.252.156]
128 sv21pub.verizon.net[206.46.252.157]
127 sv22pub.verizon.net[206.46.252.158]
124 sv23pub.verizon.net[206.46.252.159]
142 sv24pub.verizon.net[206.46.252.160]
113 sv25pub.verizon.net[206.46.252.161]
154 sv26pub.verizon.net[206.46.252.162]
129 sv28pub.verizon.net[206.46.252.164]
131 sv2pub.verizon.net[206.46.252.138]
128 sv3pub.verizon.net[206.46.252.139]
146 sv4pub.verizon.net[206.46.252.140]
141 sv5pub.verizon.net[206.46.252.141]
107 sv6pub.verizon.net[206.46.252.142]
76 sv7pub.verizon.net[206.46.252.143]
113 sv8pub.verizon.net[206.46.252.144]
122 sv9pub.verizon.net[206.46.252.145]
2 vms039pub.verizon.net[206.46.252.39]
95 vms040pub.verizon.net[206.46.252.40]
1 vms041pub.verizon.net[206.46.252.41]
77 vms042pub.verizon.net[206.46.252.42]
87 vms044pub.verizon.net[206.46.252.44]
4 vms045pub.verizon.net[206.46.252.45]
87 vms046pub.verizon.net[206.46.252.46]
2 vms047pub.verizon.net[206.46.252.47]
107 vms048pub.verizon.net[206.46.252.48]
1 vms049pub.verizon.net[206.46.252.49]
1 vms050pub.verizon.net[206.46.252.50]
1 vms051pub.verizon.net[206.46.252.51]
7 vms053pub.verizon.net[206.46.252.53]
7 vms055pub.verizon.net[206.46.252.55]
27 vms115pub.verizon.net[206.46.252.115]
12 vms123pub.verizon.net[206.46.252.123]
2.) Please ensure that your server accepts a Null Mail From:
command e.g. Mail From:<>.
probably null sender is a bad choice for SAV sender, but perfectly legal.
3.) Please ensure your mail server responds to the SMTP commands
within 30 seconds.
The RFC suggests that 3 minutes is reasonable
, and to go all the way down to 30 seconds is really pushing it in a
world where there is both tarpitting and many servers with
performance issues due to spam.
... is spam's problem, not SAV, is the slow mailserver's problem, not
SAV. If an MX is so overwhelmed that it can't pickup the phone in 30
seconds and proceed through an SMTP dialog with only a couple seconds
delay between command/response, it has MUCH bigger, more pressing
problems than SAV probes.
if you send from a server protected by SAV to another server
protected by SAV, it is possible that your servers will both demand
the other verify their own address.
One advantage of SAV probes using null sender is that the target
machine can't do its own SAV probe of a null sender.
Two machine reciprocating SAV is not a deadly embrace, and happens
only for the initial contact between the two machines (assuming they
cache the results)
After all is said and done, and if you fail their SAV, you reach
some sort limit with them and they blacklist your domain automatically.
Not clear what you mean. If YOUR outbound is sending lots of
messages to Verizon that fail SAV back your MX, then your outbound is
at risk of being blacklisted at many MXs, not just at Verizon.
I'm well aware of the "religious war" pro/con about SAV and for
greylisting. Both sides are "right", pick your side. :)
Len
To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/