Am 05.02.2015 um 11:03 schrieb lst_ho...@kwsoft.de:
You are putting too much of meaning in a DNS token. There is no global
rule or RFC about the interpretation of the string forming this token.
I'm totaly free to call my host bad-host-static-0815.example.com.

which is no problem because it don't match
[\.\-]?[0-9]{1,3}[\.\-][0-9]{1,3}[\.\-][0-9]{1,3}[\.\-][0-9]{1,3}[\.\-]

There are a lot of zombies in the *.comcastbusiness.* PTR space, but
you throw out the baby with the bathwater.  There are other ways to
get rid of the zombies on static IPs without wholesale blocking.
Greylisting and a couple reliable RBLs (or postscreen) will block
the vast majority of zombies without wholesale slaughter.

you did not get the point:

if PTR's with a IP-part would be rejected worldwide and ISP's would
block outgoing port 25 for homeusers the business of infect client PCs
to send out malware to MX hosts would die from one day to the next

* greylisting does *much* more harm be it for large senders
  retry with a dfiierent IP or sender verification on the
  other side for your own outgoing mail

It is true that it is more burden for the sender, but that is *always*
the case with spam preventing systems

no it's not always

greylisting slows down legit mail too

* all the dialupo RBLs are far from complete

You don't need them

* other RBLs are way too late, if someone makes it on them
  he already had sucess in send his crap out

With greylisting the RBL has time to settle

with a well desigend PTR filter you don't have the delay of greylisting and 95% of the PTR rejects are *later* in enough of the 28 RBL's of the postscreen mix - it looks like below

---------------------------------------------------------------------------------------

195-154-48-147.rev.poneytelecom.eu (195.154.48.147)

* RBL: b.barracudacentral.org
* RBL: bl.mailspike.net
* RBL: dnsbl.inps.de
* RBL: dnsbl.sorbs.net
* RBL: dnsbl-uce.thelounge.net
* RBL: zen.spamhaus.org

Jan 29 22:57:40: 195-154-48-147.rev.poneytelecom.eu: PTR 615; ****; ****
Jan 30 05:38:49: RBL inps.de; ****; ****
Jan 30 05:39:00: RBL inps.de; ****; ****
Jan 30 05:39:10: RBL inps.de; ****; ****
Jan 30 05:39:17: RBL inps.de; ****; ****
---------------------------------------------------------------------------------------

* there is no single reason for not have a sane PTR

I'm free to call my hosts as i like as long as it is a valid DNS token

surely, you are free to configure your server in a way to get delivery problems and since a lot of customers only hosting DNS here insisted to get a SPF record for avoid their mails going to the spam folder at gmail and other large providers virtually nobody has such a generic PTR and at the same time no SPF *and* no DNSWL entry

* postfix has even a setting that A/PTR needs to *match*
  and if someone enables that we no longer dicuss about
  the PTR part in the reverse DNS at all

This is not related at all. With a matching PTR there is some *week*
evidence that i'm the "owner" of the IP, nothing more.

it * is* related because if it is no longer a 123.123.123.123.isp.tld but your domain it is *not* some infected *enduser machine* and all the dialup-rbls are far away from complete

See, even you don't block everyone with an offending PTR -- you
check for valid SPF or dnswl

because the intention is *not* to block mailservers
a random enduser IP i not listed in the SPF record nor on DNSWL's

We don't care about DNS names and we do not even check for matching PTR
or SPF,DNSWL and the like and still our spam ratio reaching the inbox
from random dial-ups is below 5%. The vast majority of spam are the
famous freemailer like Yahoo,Hotmail,Google some hacked edu-accounts and
the well connected SPF/PTR whatever clean spam centers around the world.

that are *your values*

we have some hundret domains and around 1200 mailusers
97% of the 473209 in the last month rejected by RBL would
have hit the PTR filters too and 90% of all incoming legit mail have SPF or are on one or more DNSWL

Connections:       531224
Delivered:         58015
Blocked:           473209

So no, to construct some meaning to DNS token which is not there is not
useful at all.

for you - that may change quickly

there are days with no single RBL reject and then there are days where within 20 minutes 50 dead-safe phishing mails are blocked where the sending IP is not on enough of the 28 RBL's in the postscreen mix and SpamAssassin catches only parts of that or is way too epensive when the amount of incoming trash get too high

Reply via email to