RE: [Mimedefang] OT: New Sendmail spam block

2005-03-25 Thread Mark

> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On
> Behalf Of John Buysse
> Sent: vrijdag 25 maart 2005 20:53
> To: mimedefang@lists.roaringpenguin.com
> Subject: Re: [Mimedefang] OT: New Sendmail spam block
>
>
> I am with one of the universities Ben is dealing with. I was quoting
> RFC 2821, not RFC 821. We are not rejecting messages with an invalid
> HELO command based on RFC 1123, as we are not verifying the the info
> provided. We are rejecting messages with an invalid HELO
> command based RFC 2821.

Then I would say you are doing a good thing. I do the same. :)

> If a remote server uses one of our IP's in the HELO
> command, our servers will reject the message.

I also reject on every HELO name which is in class=w (sendmail), but
connects with the wrong IP (including, but not limited, to addresses which
resolve to 'localhost', but are not from 127.*). Very effective, too. A
lot of spammers seem to think that you will somehow give them a
passepartout if only they use your hostname for HELO. ;) That logic has
always escaped me; for even if I were not monitoring HELO names,
connecting with such faked, local HELO names means absolutely nothing to
sendmail, in terms of giving out extra credit. All a spammer really does
that way, is unequivocally announce and confirm his own status as a
bonafide spammer.

- Mark 
 
System Administrator Asarian-host.org
 
---
"If you were supposed to understand it,
we wouldn't call it code." - FedEx

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] OT: New Sendmail spam block

2005-03-25 Thread Richard Laager
On Fri, 2005-03-25 at 16:42 -0600, Les Mikesell wrote:
> On Thu, 2005-03-24 at 18:34, Richard Laager wrote:
> 
> > If he's blocking because the domain you're sending *doesn't resolve to
> > the IP address of your machine*, he's broken. You *might* also be
> > broken.
> 
> Or you might be multi-homed and not changing your name to match
> the interface for each conversation.

Or you might be behind a NAT or PAT device. That's why I said "might".

-- 
Richard Laager <[EMAIL PROTECTED]>
Wikstrom Telecom Internet

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] OT: New Sendmail spam block

2005-03-25 Thread Les Mikesell
On Thu, 2005-03-24 at 18:34, Richard Laager wrote:

> If he's blocking because the domain you're sending *doesn't resolve to
> the IP address of your machine*, he's broken. You *might* also be
> broken.

Or you might be multi-homed and not changing your name to match
the interface for each conversation.

-- 
  Les Mikesell
   [EMAIL PROTECTED]


___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] OT: New Sendmail spam block

2005-03-25 Thread James Ebright
You are neglecting section 4.1.4:

  An SMTP server MAY verify that the domain name parameter in the EHLO
  command actually corresponds to the IP address of the client.
  However, the server MUST NOT refuse to accept a message for this
  reason if the verification fails: the information about verification
  failure is for logging and tracing only. 

and also the text of section 4.1.1.1 reads:

   In situations in which the
   SMTP client system does not have a meaningful domain name (e.g., when
   its address is dynamically allocated and no reverse mapping record is
   available), the client SHOULD send an address literal (see section
   4.1.3), optionally followed by information that will help to identify
   the client system.

The keyword here is SHOULD which means the client does not have to or may
not be able to for some reason. I have logs of thousands of "BOGUS HELOS" and
have found a great many MTAs out there do not send correctly formatted
HELO/EHLO... including MS Exchange. In addition I would say at least 90% of
the windows MUAs out there do not send a correctly formatted HELO/EHLO.

In short, I do think if you are using the value in the HELO/EHLO string to
reject messages based soley on the formatting of that value, that you are in
violation of RFC 2821 section 4.1.1.1 and 4.1.4 and are going to get a great
many complaints from people as to "why cant I get this message from my
colleage at this institution" or "Why is my message to XX at your
university rejected?"

Bottom line, I have had zero false positives in my testing with bad formatted
literals (bare IPs as a literal), these I reject after RCPT TO: to remain
compliant and to be able to not reject abuse and postmaster messages... which
by the way will also put you in violation...

Rejecting the others due to them not having a FQDN that is resolvable is just
asking for more work for your mail admins

Did you not enable the business logic with some logging first (and no rejects)
to see what impact this would have on your mail server and customer base?

Jim

PS: results here are from my testing here with my customer base, your results
may vary.

On Fri, 25 Mar 2005 12:29:46 -0500, John Buysse wrote
> I am with one of the universities Ben is dealing with.  I was 
> quoting RFC 2821, not RFC 821.  We are not rejecting messages with 
> an invalid HELO command based on RFC 1123, as we are not verifying 
> the the info provided.  We are rejecting messages with an invalid 
> HELO command based on RFC 2821.  If a remote server uses one of our 
> IP's in the HELO command, our servers will reject the message.  Our 
> servers will also reject the message if the value given in the HELO 
> command is an unqualified hostname or is not an address literal, as 
> stated in sections 
> 4.1.1.1 and 4.1.3 of RFC 2821.  We are only ensuring the value given 
> in the HELO command is syntactically correct as stated in RFC 2821.



--
EsisNet.com Webmail Client

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] OT: New Sendmail spam block

2005-03-25 Thread John Buysse
I am with one of the universities Ben is dealing with.  I was quoting 
RFC 2821, not RFC 821.  We are not rejecting messages with an invalid 
HELO command based on RFC 1123, as we are not verifying the the info 
provided.  We are rejecting messages with an invalid HELO command based 
on RFC 2821.  If a remote server uses one of our IP's in the HELO 
command, our servers will reject the message.  Our servers will also 
reject the message if the value given in the HELO command is an 
unqualified hostname or is not an address literal, as stated in sections 
4.1.1.1 and 4.1.3 of RFC 2821.  We are only ensuring the value given in 
the HELO command is syntactically correct as stated in RFC 2821.

Thanks,
John Buysse

David F. Skoll wrote:
On Thu, 24 Mar 2005, Ben Kamen wrote:

The person I've been having the problems with is quoting RFC821, but
forgetting he's breaking RFC1123 which is the amendment to 821.

The latest is RFC 2821.
Regards,
David.
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] OT: New Sendmail spam block

2005-03-25 Thread Ben Kamen
James Ebright wrote:
>
> Anyway, still sifting some of this.. maybe I will change my mind but bottom
> line is.. I think your Norton product is broke!
>
It's not my system. It belongs to someone I help out. But as I already told 
the other admin - this extent, I do believe this could be done better. Most 
definitely.

I appreciate everyone's help and insight into this. Spam has past the point of 
being an annoying problem. It's making the rest of us run around on these 
crazy sidetracks when our time is better spent on more important things.

Who wants to email Bob Metcalf and get his take on when the internet will melt 
down THIS time?  ;)

 -Ben
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] OT: New Sendmail spam block

2005-03-25 Thread James Ebright
>From RFC2821:

4.1.1.1  Extended HELLO (EHLO) or HELLO (HELO)

   These commands are used to identify the SMTP client to the SMTP
   server.  The argument field contains the fully-qualified domain name
   of the SMTP client if one is available.  In situations in which the
   SMTP client system does not have a meaningful domain name (e.g., when
   its address is dynamically allocated and no reverse mapping record is
   available), the client SHOULD send an address literal (see section
   4.1.3), optionally followed by information that will help to identify
   the client system. 

Looks to me that the keyword SHOULD means you do not have to if you have a
good reason not to. However, your system probably does have a meaningful
domain name and a FQDN in DNS just your MTA (Norton gateway) is not doing
the correct thing and probably needs to be behind a real MTA, thus, I do think
that your MTA is just as "non compliant" as theirs is, if not more so.

However looks like section 4.1.4 still has this text:

   An SMTP server MAY verify that the domain name parameter in the EHLO
   command actually corresponds to the IP address of the client.
   However, the server MUST NOT refuse to accept a message for this
   reason if the verification fails: the information about verification
   failure is for logging and tracing only.

Which leads me to believe that in order to be fully compliant, you can not
disallow a message solely due to the HELO/EHLO that was given.

In the examples we have laid out in previous messages we took the HELO and
rejected the message based not soley on the HELO but also due to the fact that
the HELO/EHLOs were attempted header forgeries of our own known systems, or a
literal in the wrong format (e.g. no brackets) in an attempted forgery or
obfuscation. Either of which I think would satisfy the RFCs MUST NOT.

Now I did notice MD using filter_recipient(sender, et al) and using return
('REJECT', "BOGUS HELO $helo blah blah blah") will issue a 550 5.7.1
reject from the milter in the filter_recipient stage (I wait until filter
recipient as I need to skip filtering my abuse addresses, and a few other
things) which is not the 500, 501, or 502 reject as specified with a MUST in
the RFC, but.. mine is not in response to the HELO parameter either but to the
RCPT TO: command and at this point I have looked at the sender, the recipient,
a list of allowed HELOs from certain IPs (e.g. my mail servers), the format of
the HELO/EHLO (the literal) and in my case user authentication, accessdb hash
table lookups on blackholed relays (in our case we delay checks thus need to
look at this inside the milter to be 100% effective), and so on, so as you
see, it is no where near based solely on the HELO/EHLO. Also, I have extensive
logged evidence that 550 rejects are what these messages actually do deserve;
all bare literals I have logged either ended up as user unkowns or
tagged/rejected as spam... _ALL_ of them. I think I am fully satisfying the
RFC in this regard as well.

So, while I think it may be a little draconian and that they are going to have
numerous issues with poorly coded MTAs... I think they are probably not in
violation of the RFC if they are doing any checking at all in conjunction with
the HELO/EHLO checks and not just pattern matching it and rejecting it. Now I
think the code we have posted that catches the bare literals is probably in
violation, in of itself... but since its implementation in MD still accepts
the bogus HELO and actually does not issue a reject until after the RCPT TO:
command (or MAIL FROM: if you run yours in filter_sender) I think we are still
in compliance with the RFC as well.

Anyway, still sifting some of this.. maybe I will change my mind but bottom
line is.. I think your Norton product is broke!

Jim

On Fri, 25 Mar 2005 11:43:24 -0600, Ben Kamen wrote
>   I'm looking over it and the section reads more like 821 than 1123.
> 
> I'm not trying to beat a dead horse - I'm just trying to make sure 
> my interpretation of the "rules" are correct. Right now, Spam has 
> everyone trying things of which some seem to break MTA's in a 
> legitamate fashion while other methods are in a way vigalantism (if 
> that's word)...
> 
> How do you politely tell another admin he's broken something against 
> an RFC when there's room for personal inflection of what the RFC is
recommending.

--
EsisNet.com Webmail Client

___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang


Re: [Mimedefang] OT: New Sendmail spam block

2005-03-25 Thread Ben Kamen
David F. Skoll wrote:
On Thu, 24 Mar 2005, Ben Kamen wrote:

The person I've been having the problems with is quoting RFC821, but
forgetting he's breaking RFC1123 which is the amendment to 821.

The latest is RFC 2821.
Thanks,
 I'm looking over it and the section reads more like 821 than 1123.
I'm not trying to beat a dead horse - I'm just trying to make sure my 
interpretation of the "rules" are correct. Right now, Spam has everyone trying 
things of which some seem to break MTA's in a legitamate fashion while other 
methods are in a way vigalantism (if that's word)...

How do you politely tell another admin he's broken something against an RFC 
when there's room for personal inflection of what the RFC is recommending.

Anyway - thanks for everyone's input.
 -ben
___
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
MIMEDefang@lists.roaringpenguin.com
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang