Re: Advice on MTA blacklist

2007-10-11 Thread mouss
David B Funk wrote:
 Jo you didn't read Chris's statement closely. A conscientious mail server
 administrator will configure the SERVER to -ONLY- accept encrypted
 connections for SMTP-AUTH transactions; the server should enforce
 the encryption requirements.
   

This is a religious war declaration or what? ok, let me see what I can
say ;-p

grin
A conscien-something admin knows that as is always the case with
encryption, security depends on the implementation (code, environment,
random number generation, ...) and not on the specification. For
example, a conscien-something admin knows about thing like this:
http://www.henlich.de/moz-smtp/

A conscien-something knows that linking a large library like openssl in
an otherwise quite safe MTA adds more opportunities for system
compromise. A conscien-somthing admin prefers to be an open relay than a
zombie.

A conscien-somthing admin knows that it is possible to protect logins
without TLS (if data protection is needed, PGP and S/MIME provide this
end-to-end, something that no server $thing can provide). sure, not all
clients support (secure) authentication methods. but same goes for
STARTTLS (and don't tell me about the obsolete smtps, because
conscien-seomthing admins don't implement obsolete things).

A conscien-something admin knows that unless client certificates are
used, starttls doesn't help against dictionary attacks performed from
botnets (so you can't just block one IP). the same admin knows that
deploying client certificates and/or assisting their users does not come
from free, unless they work in a givernment organization financed by
public taxes (but even then, a conscien-* admin won't spend people's
money so frivoulously).

A conscien-something admin knows that the private key is somewhere on
the system, and that protecting it does not come for free.

And of course, a conscien-something admin can setup an IPSec/ssh/*
tunnel and not care about STARTTLS at all, ... and still feel
consciencious. but maybe not. maybe he should still enforce STARTTLS?
Come on...

/grin

TLS is nice, but...

 Thus it does not matter what the client wants to do, the server should
 not let the client continue the SMTP-AUTH transaction until it has
 completed the STARTTLS operation (or in the case of SMTPS, it's
 already encrypted).
 Back to Skip's question, possibly the easiest way to solve his
 problem would be to run two SMTP servers, one on port 25 with full
 spam/AV scanning for regular mail traffic, one on ports 587  645 with
 SMTP-AUTH/TLS for his users' clients to submit messages, on that one
 have AV scanning and possibly limited spam scanning.
   

Fully agreed.


Re: Advice on MTA blacklist

2007-10-10 Thread Jeff Chan
Quoting Richard Smits [EMAIL PROTECTED]:

 Thanks for all the advice.. I think we will be using spamhaus. I am
 running a test and it blocks a lot of spam. Currently I use the
 sbl.spamhaus and pbl.spamhaus
 Is this wise, or should I also use the xbl and switch to zen.spamhaus?

Please do not use the individual Spamhaus lists at the MTA level.  Please use
zen.spamhaus.org

Cheers,

Jeff C.





RE: Advice on MTA blacklist

2007-10-10 Thread Jeff Chan
Quoting Skip [EMAIL PROTECTED]:

 I am not certain how anyone can claim that they have no FPs running through
 those services unless they have prior knowledge of every inbound email.
 That is impossible.  My company deals with on the order of thousands of
 companies and multiple times that in email addresses.  There is no way to
 know how many of those systems were falsely (or correctly) placed on a
 blacklist at any point in time.

I don't think any blacklist operator will claim that their blacklists have no
false positives.  The false positives vary by list.  Some have more, some have
fewer, and their characteristics may vary between lists.  It's a responsibility
of the mail administrator user of the blacklists to understand the differences
and use the tools appropriately.

Jeff C.


Re: Advice on MTA blacklist

2007-10-10 Thread R.Smits
Jeff Chan wrote:
 Quoting Richard Smits [EMAIL PROTECTED]:
 
 Thanks for all the advice.. I think we will be using spamhaus. I am
 running a test and it blocks a lot of spam. Currently I use the
 sbl.spamhaus and pbl.spamhaus
 Is this wise, or should I also use the xbl and switch to zen.spamhaus?
 
 Please do not use the individual Spamhaus lists at the MTA level.  Please use
 zen.spamhaus.org
 
 Cheers,
 
 Jeff C.
 
 
 
Hello,

Why not ?
We use : sbl-xbl.spamhaus.org now. It does not include the PBL (policy
Block List)

We serve a big university and we cannot afford False Positives.
I can imagine that someone one the PBL (home user) runs a small
mailserver and cannot connect to our server ?

Or am I seeing trouble that is not there :-)

I do not know the PBL as good... but I like the idea.

Greetings... Richard


Re: Advice on MTA blacklist

2007-10-10 Thread Jeff Chan
Quoting R.Smits [EMAIL PROTECTED]:

 Jeff Chan wrote:
  Quoting Richard Smits [EMAIL PROTECTED]:
 
  Thanks for all the advice.. I think we will be using spamhaus. I am
  running a test and it blocks a lot of spam. Currently I use the
  sbl.spamhaus and pbl.spamhaus
  Is this wise, or should I also use the xbl and switch to zen.spamhaus?
 
  Please do not use the individual Spamhaus lists at the MTA level.  Please
 use
  zen.spamhaus.org

 Why not ?
 We use : sbl-xbl.spamhaus.org now. It does not include the PBL (policy
 Block List)

 We serve a big university and we cannot afford False Positives.
 I can imagine that someone one the PBL (home user) runs a small
 mailserver and cannot connect to our server ?

 Or am I seeing trouble that is not there :-)

 I do not know the PBL as good... but I like the idea.

The original poster was using SBL and PBL and was considering using XBL.  In
that case, it certainly makes more sense to use zen since it would mean one
third as many DNS queries compared to querying each list individually.  If you
can't use PBL, then please continue using sbl-xbl as that cuts the queries in
half.

Cheers,

Jeff C.



RE: Advice on MTA blacklist

2007-10-10 Thread Leon Kolchinsky
 Hello,
 
 Which spam blacklists do you use in your MTA config. (postfix)
 smptd_client_restrictions
 
 Currently we only use : reject_rbl_client list.dsbl.org
 
 We let spamassassin fight the rest of the spam. But the load of spam is
 getting to high for our organisation. Wich list is safe enough to block
 senders at MTA level ?
 
 Spamhaus, or spamcop ?
 
 I would like to hear some advice or maybe your current setup ?
 
 Thank you for any advice we can use .
 
 Greetings Richard


I'm using 
reject_rbl_client zen.spamhaus.org,
reject_rbl_client safe.dnsbl.sorbs.net,
reject_rbl_client list.dsbl.org,

and zen.spamhaus.org filtering about 98% of all rbl rejects.


Regards,
Leon Kolchinsky



Re: Advice on MTA blacklist

2007-10-10 Thread Chris Edwards
On Wed, 10 Oct 2007, R.Smits wrote:

| We use : sbl-xbl.spamhaus.org now. It does not include the PBL (policy
| Block List)
| 
| We serve a big university and we cannot afford False Positives.
| I can imagine that someone one the PBL (home user) runs a small
| mailserver and cannot connect to our server ?

Hi,

Sorry you've confused me now!  Unless I've got the posts mixed up, then 
yesterday in Message-ID: [EMAIL PROTECTED] you said you *were* 
using the PBL:

  Currently I use the sbl.spamhaus and pbl.spamhaus Is this wise, or 
   should I also use the xbl and switch to zen.spamhaus?


For what it's worth, we are a large University and we use ZEN with no 
problems whatsoever.



Re: Advice on MTA blacklist

2007-10-10 Thread mouss
R.Smits wrote:
 Jeff Chan wrote:
   
 Quoting Richard Smits [EMAIL PROTECTED]:

 
 Thanks for all the advice.. I think we will be using spamhaus. I am
 running a test and it blocks a lot of spam. Currently I use the
 sbl.spamhaus and pbl.spamhaus
 Is this wise, or should I also use the xbl and switch to zen.spamhaus?
   
 Please do not use the individual Spamhaus lists at the MTA level.  Please use
 zen.spamhaus.org

 Cheers,

 Jeff C.



 
 Hello,

 Why not ?
 We use : sbl-xbl.spamhaus.org now. It does not include the PBL (policy
 Block List)

 We serve a big university and we cannot afford False Positives.
 I can imagine that someone one the PBL (home user) runs a small
 mailserver and cannot connect to our server ?

   

do you consider it an FP if their ISP blocks port 25?

If they really run a normal MTA, and if that is authorized by their
ISP, then they should ask to be unlisted.  (They should also get a
meaningful reverse DNS so that they can be identified).
Otherwise, they should relay via their ISP...



 Or am I seeing trouble that is not there :-)

 I do not know the PBL as good... but I like the idea.

 Greetings... Richard


   



Re: Advice on MTA blacklist

2007-10-10 Thread mouss
Leon Kolchinsky wrote:
 Hello,

 Which spam blacklists do you use in your MTA config. (postfix)
 smptd_client_restrictions

 Currently we only use : reject_rbl_client list.dsbl.org

 We let spamassassin fight the rest of the spam. But the load of spam is
 getting to high for our organisation. Wich list is safe enough to block
 senders at MTA level ?

 Spamhaus, or spamcop ?

 I would like to hear some advice or maybe your current setup ?

 Thank you for any advice we can use .

 Greetings Richard
 


 I'm using 
 reject_rbl_client zen.spamhaus.org,
 reject_rbl_client safe.dnsbl.sorbs.net,
 reject_rbl_client list.dsbl.org,

 and zen.spamhaus.org filtering about 98% of all rbl rejects.

   

You can't count like this. because what is rejected by zen is not
checked against the other two.
changing the order of the checks will give you different numbers.

the only way to get real numbers is to put
warn_if_reject reject_rbl_client $list1
warn_if_reject reject_rbl_client $list2
warn_if_reject reject_rbl_client $list3
before the actual rejects. This way you can count the reject_warning log
lines. now this means more lookups (you will lookup all the DNSBLs,
instead of stopping at first listing).




Re: Advice on MTA blacklist

2007-10-10 Thread Jeff Chan
Quoting mouss [EMAIL PROTECTED]:

 If they really run a normal MTA, and if that is authorized by their
 ISP, then they should ask to be unlisted.  (They should also get a
 meaningful reverse DNS so that they can be identified).
 Otherwise, they should relay via their ISP...

Indeed, one of the strong points of PBL is that it's relatively easy to get
legitimate mailservers removed from the list.  Agree with your other comments
too.

Jeff C.



Re: Advice on MTA blacklist

2007-10-10 Thread David B Funk
On Tue, 9 Oct 2007, Jo Rhett wrote:

 On Oct 9, 2007, at 4:22 PM, Chris Edwards wrote:
  Your server then enforces encryption and SMTP-AUTH, and the SSL will
  (hopefully) defeat any man-in-the-middle attacks by trans-proxies.

 That's exactly the problem I am reporting.  A lot of mail clients
 don't enforce SSL connections, so man in the middle is silently
 accepted.  Only T-bird can be configured to not work any other way,
 TTBOMK.

Jo you didn't read Chris's statement closely. A conscientious mail server
administrator will configure the SERVER to -ONLY- accept encrypted
connections for SMTP-AUTH transactions; the server should enforce
the encryption requirements.
Thus it does not matter what the client wants to do, the server should
not let the client continue the SMTP-AUTH transaction until it has
completed the STARTTLS operation (or in the case of SMTPS, it's
already encrypted).

Back to Skip's question, possibly the easiest way to solve his
problem would be to run two SMTP servers, one on port 25 with full
spam/AV scanning for regular mail traffic, one on ports 587  645 with
SMTP-AUTH/TLS for his users' clients to submit messages, on that one
have AV scanning and possibly limited spam scanning.


-- 
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{


Re: [sa-list] Re: Advice on MTA blacklist

2007-10-10 Thread Dan Mahoney, System Admin

On Wed, 10 Oct 2007, David B Funk wrote:


On Tue, 9 Oct 2007, Jo Rhett wrote:


On Oct 9, 2007, at 4:22 PM, Chris Edwards wrote:

Your server then enforces encryption and SMTP-AUTH, and the SSL will
(hopefully) defeat any man-in-the-middle attacks by trans-proxies.


That's exactly the problem I am reporting.  A lot of mail clients
don't enforce SSL connections, so man in the middle is silently
accepted.  Only T-bird can be configured to not work any other way,
TTBOMK.


Jo you didn't read Chris's statement closely. A conscientious mail server
administrator will configure the SERVER to -ONLY- accept encrypted
connections for SMTP-AUTH transactions; the server should enforce
the encryption requirements.
Thus it does not matter what the client wants to do, the server should
not let the client continue the SMTP-AUTH transaction until it has
completed the STARTTLS operation (or in the case of SMTPS, it's
already encrypted).

Back to Skip's question, possibly the easiest way to solve his
problem would be to run two SMTP servers, one on port 25 with full
spam/AV scanning for regular mail traffic, one on ports 587  645 with
SMTP-AUTH/TLS for his users' clients to submit messages, on that one
have AV scanning and possibly limited spam scanning.


Assuming sendmail (and we don't make such assumptions), you can specify 
different options per-port, such that you don't need to run two mail 
servers.


For example, I have no less than seven virtual daemons configured:

Submission agents on 587 and 2525, which require auth, and have encryption 
optional.  Also listens on 127.1.


A submission agent on 465 (not 645), configured the same way, but with 
encryption explicit.


Standard daemon on port 25 (and yes, it still supports the optional 
encryption).


As a bonus, my own server any port will present a FQDN, signed 
certificate (not self-signed).  I've actually found other servers out 
there in the wild that do the same, with a valid cert -- I've got my 
server configured with the CA root certs so it knows which are true 
(this doesn't affect ability to relay or anything, but it's cool to see 
others are doing it).


Of course, all this is wildly off the topic, but hey...

-Dan

--

And, a special guest, from the future, miss Ria Pischell.  Miss Pischell,
as you all know, is the inventor of the Statiophonic Oxygenetic
Amplifiagraphaphonadelaverberator, and it's pretty hard to imagine life
without one of those.

-Rufus, Bill  Ted's Bogus Journey


Dan Mahoney
Techie,  Sysadmin,  WebGeek
Gushi on efnet/undernet IRC
ICQ: 13735144   AIM: LarpGM
Site:  http://www.gushi.org
---



Re: Advice on MTA blacklist

2007-10-09 Thread Byung-Hee HWANG
On Tue, 2007-10-09 at 17:34 +0200, R.Smits wrote:
 Hello,
 
 Which spam blacklists do you use in your MTA config. (postfix)
 smptd_client_restrictions
 
 Currently we only use : reject_rbl_client list.dsbl.org
 
 We let spamassassin fight the rest of the spam. But the load of spam is
 getting to high for our organisation. Wich list is safe enough to block
 senders at MTA level ?
 
 Spamhaus, or spamcop ?
 
 I would like to hear some advice or maybe your current setup ?
 

I would like to recommend this: (that includes rbl lists) 
http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt

-- 
Byung-Hee HWANG [EMAIL PROTECTED]

As he drove Johnney home, Nino thought that if that was success, he didn't
want it.
-- the Nino Valenti's inside, Chapter 13, page 189


Re: Advice on MTA blacklist

2007-10-09 Thread John Rudd

R.Smits wrote:

Hello,

Which spam blacklists do you use in your MTA config. (postfix)
smptd_client_restrictions

Currently we only use : reject_rbl_client list.dsbl.org

We let spamassassin fight the rest of the spam. But the load of spam is
getting to high for our organisation. Wich list is safe enough to block
senders at MTA level ?

Spamhaus, or spamcop ?




Spamhaus: yes.  Use zen.spamhaus.org  (you might end up needing to pay 
for it, and use a local cache, if you're a heavy traffic site, but, 
frankly, it's worth paying for).



Spamcop: no.  Don't use them as an MTA RBL.  I'm leery of even using 
them as a SA RBL, but it's a very bad idea to use them as an MTA RBL 
(too many false positives).


RE: Advice on MTA blacklist

2007-10-09 Thread Skip
 
None.  I'd rather bump up my system resources than allow a system completely
out of my control to assess whether or not mail should run through my MTA
and SA.

- Skip



Re: Advice on MTA blacklist

2007-10-09 Thread D Hill

On Tue, 9 Oct 2007 at 10:00 -0700, [EMAIL PROTECTED] confabulated:

Spamhaus: yes.  Use zen.spamhaus.org  (you might end up needing to pay for 
it, and use a local cache, if you're a heavy traffic site, but, frankly, it's 
worth paying for).


We use Spamhaus here with their datefeed service. Our two filter servers 
reject an average 3.2 million messages every 24 hours with using 
zen.spamhaus.org.


Re: Advice on MTA blacklist

2007-10-09 Thread Jeff Chan
Quoting John Rudd [EMAIL PROTECTED]:

 R.Smits wrote:
  Hello,
 
  Which spam blacklists do you use in your MTA config. (postfix)
  smptd_client_restrictions
 
  Currently we only use : reject_rbl_client list.dsbl.org
 
  We let spamassassin fight the rest of the spam. But the load of spam is
  getting to high for our organisation. Wich list is safe enough to block
  senders at MTA level ?
 
  Spamhaus, or spamcop ?
 


 Spamhaus: yes.  Use zen.spamhaus.org  (you might end up needing to pay
 for it, and use a local cache, if you're a heavy traffic site, but,
 frankly, it's worth paying for).


 Spamcop: no.  Don't use them as an MTA RBL.  I'm leery of even using
 them as a SA RBL, but it's a very bad idea to use them as an MTA RBL
 (too many false positives).



I was about to give the same answer

Jeff C.


Re: Advice on MTA blacklist

2007-10-09 Thread Rob McEwen

John Rudd wrote:
Spamcop: no.  Don't use them as an MTA RBL.  I'm leery of even using 
them as a SA RBL, but it's a very bad idea to use them as an MTA RBL 
(too many false positives).
Actually, sometime in the past several months, SpamCop's FP rate dropped 
dramatically. I'm not privy to the inside details, but they must have 
made some dramatic changes. Therefore, whatever bad FP reputation 
they've earned over the years should be erased and they should be 
reassessed.


Rob McEwen



Re: Advice on MTA blacklist

2007-10-09 Thread Justin Mason

Jeff Chan writes:
 Quoting John Rudd [EMAIL PROTECTED]:
  R.Smits wrote:
  Spamcop: no.  Don't use them as an MTA RBL.  I'm leery of even using
  them as a SA RBL, but it's a very bad idea to use them as an MTA RBL
  (too many false positives).
 
 I was about to give the same answer

actually Spamcop is looking pretty good these days, after some
backend changes they made a few months back:

  spam:   53.8562% 225813 of 419287 messages
  ham: 0.0894% 71 of 79398 messages  

http://ruleqa.spamassassin.org/20071006-r582471-n/RCVD_IN_BL_SPAMCOP_NET/detail

--j.


Re: Advice on MTA blacklist

2007-10-09 Thread Ralf Hildebrandt
* R.Smits [EMAIL PROTECTED]:
 Hello,
 
 Which spam blacklists do you use in your MTA config. (postfix)
 smptd_client_restrictions

None, we put them like all restrictions into
smtpd_recipient_restrictions.
 
 Currently we only use : reject_rbl_client list.dsbl.org

reject_rbl_client zen.spamhaus.org

-- 
Ralf Hildebrandt (i.A. des IT-Zentrums) [EMAIL PROTECTED]
Charite - Universitätsmedizin BerlinTel.  +49 (0)30-450 570-155
Gemeinsame Einrichtung von FU- und HU-BerlinFax.  +49 (0)30-450 570-962
IT-Zentrum Standort CBFsend no mail to [EMAIL PROTECTED]


Re: Advice on MTA blacklist

2007-10-09 Thread Rob McEwen
Also, psbl.surriel.com has gotten much better in recent months. It used 
to have occasional FPs, but I haven't seen any in a while. In my own 
spam filtering, I merely score on RBLs and I don't outright block... but 
if I were a large ISP which didn't have that luxury, I'd probably use 
the following five RBLs for outright blocking:


• zen
• dsbl
• spamcop (now that it has improved)
• psbl (now that it has improved)
• ivmSIP.com (mine)

(njabl **almost** made the cut... I'd take a close look second look at 
that one)


All five of these are safe for outright blocking... if one doesn't mind 
having a tiny fraction of a percent of FPs ...combined, I'm guessing 
that these five lists probably produce **LESS** than 1/10 of 1% FPs... 
most of which would be due to misconfigured small office servers spewing 
spam or backscatter and stuff like that where some of the legit mail 
from the SAME IPs also gets blocked... but no egregious mistakes or 
large MTAs blocked by these.


There is no other list out there that comes close to these five lists in 
terms of low FPs combined with relevancy... that being, does that one 
list still block a decent percentage of **additional** spam even if the 
other four lists were already in use prior to adding that fifth list. 
Lists that have zero FPs, but don't find any additional Spammer's IPs 
didn't make that list.


Rob McEwen wrote:

John Rudd wrote:
Spamcop: no. Don't use them as an MTA RBL. I'm leery of even using 
them as a SA RBL, but it's a very bad idea to use them as an MTA RBL 
(too many false positives).
Actually, sometime in the past several months, SpamCop's FP rate 
dropped dramatically. I'm not privy to the inside details, but they 
must have made some dramatic changes. Therefore, whatever bad FP 
reputation they've earned over the years should be erased and they 
should be reassessed.


Rob McEwen






Re: Advice on MTA blacklist

2007-10-09 Thread Aaron Wolfe
On 10/9/07, R.Smits [EMAIL PROTECTED] wrote:

 Hello,

 Which spam blacklists do you use in your MTA config. (postfix)
 smptd_client_restrictions

 Currently we only use : reject_rbl_client list.dsbl.org

 We let spamassassin fight the rest of the spam. But the load of spam is
 getting to high for our organisation. Wich list is safe enough to block
 senders at MTA level ?

 Spamhaus, or spamcop ?

 I would like to hear some advice or maybe your current setup ?

 Thank you for any advice we can use .

 Greetings Richard


I would use spamhaus for MTA reject and spamcop in SA.   I've also been
evaluating a very interesting new RBL for several weeks called the ivmSIP
rbl.  Its designed to work after RBLs like spamhaus to catch what they miss
and it works quite well so far.  It's catching about 30% of the mail that
makes it past both spamhaus and spamcop (and of course some of that mail is
actually not spam :).  The web site for the new list isn't ready yet but you
can ask for a trial feed by emailing  Mr. Rob McEwen at [EMAIL PROTECTED]


Re: Advice on MTA blacklist

2007-10-09 Thread Richard Smits
 
 Hello,
 
 Which spam blacklists do you use in your MTA config. (postfix)
 smptd_client_restrictions
 
 Currently we only use : reject_rbl_client list.dsbl.org
 http://list.dsbl.org
 
 We let spamassassin fight the rest of the spam. But the load of spam is
 getting to high for our organisation. Wich list is safe enough to block
 senders at MTA level ?
 
 Spamhaus, or spamcop ?
 
 I would like to hear some advice or maybe your current setup ?
 
 Thank you for any advice we can use .
 
 Greetings Richard
 
 
 I would use spamhaus for MTA reject and spamcop in SA.   I've also been
 evaluating a very interesting new RBL for several weeks called the
 ivmSIP rbl.  Its designed to work after RBLs like spamhaus to catch
 what they miss and it works quite well so far.  It's catching about 30%
 of the mail that makes it past both spamhaus and spamcop (and of course
 some of that mail is actually not spam :).  The web site for the new
 list isn't ready yet but you can ask for a trial feed by emailing  Mr.
 Rob McEwen at [EMAIL PROTECTED] mailto:[EMAIL PROTECTED]

Thanks for all the advice.. I think we will be using spamhaus. I am
running a test and it blocks a lot of spam. Currently I use the
sbl.spamhaus and pbl.spamhaus
Is this wise, or should I also use the xbl and switch to zen.spamhaus?




Re: Advice on MTA blacklist

2007-10-09 Thread Chris Edwards
On Tue, 9 Oct 2007, Richard Smits wrote:

| Thanks for all the advice.. I think we will be using spamhaus. I am
| running a test and it blocks a lot of spam. Currently I use the
| sbl.spamhaus and pbl.spamhaus
| Is this wise, or should I also use the xbl and switch to zen.spamhaus?

You should definitely by using the xbl (or better zen).

I suspect you'll find it hits more spam than just about anything else.

Preferably use as outright reject at the MTA level.


RE: Advice on MTA blacklist

2007-10-09 Thread Skip
 Well, in the real world, many of us who would have to scan 
 over 150,000 inbound emails a day, of which about 85% are 
 pure 100% spam simply don't have that luxury... 
 
 We've had best results with zen.spamhaus.org , other dnsbls 
 seem unreliable/not worth the effort
 
 regards,
 jp

Admittedly, I process more on the order of 10,000 messages a day.  But your
second point here is the very reason I won't use them: unreliable.  When I
initially rolled out SA, I was using both spamcop and spamhaus along with a
couple of others.  I quickly eliminated down to those two.  Then to one.
Then removed them entirely after about 2 months of use.  

I have a number of travelling personnel from my company.  I don't want the
call at 11pm on a Wednesday night or 6 am on a Sunday morning from a hotel
and the network they are on is on one of those lists and they can't use
their email.  I also have seen my ISP have a range of their network falsely
flagged (and it encompassed our network range) for a period of 36-48 hours.
That put a major dent in communication with our customers.

I am not certain how anyone can claim that they have no FPs running through
those services unless they have prior knowledge of every inbound email.
That is impossible.  My company deals with on the order of thousands of
companies and multiple times that in email addresses.  There is no way to
know how many of those systems were falsely (or correctly) placed on a
blacklist at any point in time.

- Skip



RE: Advice on MTA blacklist

2007-10-09 Thread Chris Edwards
On Tue, 9 Oct 2007, Skip wrote:

| I have a number of travelling personnel from my company.  I don't want the
| call at 11pm on a Wednesday night or 6 am on a Sunday morning from a hotel
| and the network they are on is on one of those lists and they can't use
| their email.

Hi,

Your travellers should be using one of:

- Authenticated SMTP submission bypassing your DNSBL tests

- VPN into your network

- Your webmail service

Thus it shouldn't matter if their hotel is blacklisted (many are).



RE: Advice on MTA blacklist

2007-10-09 Thread James E. Pratt


 -Original Message-
 From: Skip [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 09, 2007 2:26 PM
 To: users@spamassassin.apache.org
 Subject: RE: Advice on MTA blacklist
 
  Well, in the real world, many of us who would have to scan
  over 150,000 inbound emails a day, of which about 85% are
  pure 100% spam simply don't have that luxury...
 
  We've had best results with zen.spamhaus.org , other dnsbls
  seem unreliable/not worth the effort
 
  regards,
  jp
 
 Admittedly, I process more on the order of 10,000 messages a day.
But
 your
 second point here is the very reason I won't use them: unreliable.
 When I
 initially rolled out SA, I was using both spamcop and spamhaus along
 with a
 couple of others.  I quickly eliminated down to those two.  Then to
 one.
 Then removed them entirely after about 2 months of use.
 
 I have a number of travelling personnel from my company.  I don't
want
 the
 call at 11pm on a Wednesday night or 6 am on a Sunday morning from a
 hotel
 and the network they are on is on one of those lists and they can't
 use
 their email.  I also have seen my ISP have a range of their network
 falsely
 flagged (and it encompassed our network range) for a period of 36-48
 hours.
 That put a major dent in communication with our customers.
 
 I am not certain how anyone can claim that they have no FPs running
 through
 those services unless they have prior knowledge of every inbound
 email.
 That is impossible.  My company deals with on the order of thousands
 of
 companies and multiple times that in email addresses.  There is no
way
 to
 know how many of those systems were falsely (or correctly) placed on
a
 blacklist at any point in time.
 
 - Skip

Good points... I'm certainly not claiming we have no fp's from spamhaus,
but since no one has complained in over a year, why would I stop now and
bring the server to it's knees? Sure, I'd love to accept and scan them
all but we simply don't have the resources...  


RE: Advice on MTA blacklist

2007-10-09 Thread Skip
 From: Chris Edwards
 Your travellers should be using one of:
 - Authenticated SMTP submission bypassing your DNSBL tests
 - VPN into your network
 - Your webmail service

All of these are available.  Unless I somehow had something configured
improperly, the blacklists were rejecting connection to the MTA before SMTP
auth.  The second two are in place because of this very issue.  Users prefer
not to use webmail because it is inefficient.  A mail client (i.e. Outlook,
Thunderbird, etc.) has their address books and keeps better records of sent
mail.

While this has solved my issues with my travelling users, it does not
eliminate the FP issues.  And I am not willing to take that risk.  If there
is a communication breakdown due to a 3rd party falsely flagging a network,
that is not going to reflect on the 3rd party.  It will reflect on us and
results in the potential for lost business.

- Skip



Re: Advice on MTA blacklist

2007-10-09 Thread Rob McEwen

Skip,

Chris's point is that your users **should** use SMTP authorization to 
distinguish their trusted connections from  other connections that must 
be spam filtered. Additionally, you should NOT do ANY spam filtering on 
these SMTP Auth connections... especially not outright RBL blocking. You 
state that the blacklists were rejecting connections to the MTA before 
SMTP... but this **is** a misconfiguration on your part. You shouldn't 
allow rejecting of connections before you get a chance to determine 
whether the connection was SMTP AUTH or not.


In a sense, you are asking for something that is unreasonable... you 
want RBLs to block spam that is spewing out of zombie-infected 
computers... but, somehow, the DNSBL is suppose to know when YOUR users 
are attempting to send direct to your server from that same zombie 
computer... where the RBL isn't bypassed for SMTP AUTH connections.


This is a fundamental flaw in your architecture. Until you fix this, 
you'll get FPs with almost all of the best RBLs that other mail 
providers use on large networks every day with virtually zero FPs. The 
problem is your configuration, not with the RBLs.


Rob McEwen

Skip wrote:

From: Chris Edwards
Your travellers should be using one of:
- Authenticated SMTP submission bypassing your DNSBL tests
- VPN into your network
- Your webmail service



All of these are available.  Unless I somehow had something configured
improperly, the blacklists were rejecting connection to the MTA before SMTP
auth.  The second two are in place because of this very issue.  Users prefer
not to use webmail because it is inefficient.  A mail client (i.e. Outlook,
Thunderbird, etc.) has their address books and keeps better records of sent
mail.

While this has solved my issues with my travelling users, it does not
eliminate the FP issues.  And I am not willing to take that risk.  If there
is a communication breakdown due to a 3rd party falsely flagging a network,
that is not going to reflect on the 3rd party.  It will reflect on us and
results in the potential for lost business.

- Skip


  




RE: Advice on MTA blacklist

2007-10-09 Thread Chris Edwards
On Tue, 9 Oct 2007, Skip wrote:

| Unless I somehow had something configured improperly, the blacklists 
| were rejecting connection to the MTA before SMTP auth.

Hi,

That's the problem - you don't want to do blacklist lookups for SMTP-AUTH 
submissions.

FWIW we use Exim which has plenty flexibility to achieve this.  I don't 
know the details for other MTAs.

Alternatively, an MTA-independent solution is to separate your MX boxes 
from your submission boxes - the latter do no spam-filtering, but mandate 
SMTP-AUTH (and/or user-on-local-network IP).

Ah - just seen Rob's said this better ;-)


Re: Advice on MTA blacklist

2007-10-09 Thread Jo Rhett

On Oct 9, 2007, at 10:37 AM, James E. Pratt wrote:
Well, in the real world, many of us who would have to scan over  
150,000
inbound emails a day, of which about 85% are pure 100% spam simply  
don't

have that luxury...


Are you using a 486 to process inbound mail?  My 1.4Ghz Athlon 2  
system with Amavis/SA processes that much mail PER HOUR without  
breaking a sweat.  No MTA-level RBLs.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness





Re: Advice on MTA blacklist

2007-10-09 Thread Jo Rhett

On Oct 9, 2007, at 11:31 AM, Chris Edwards wrote:

Your travellers should be using one of:
- Authenticated SMTP submission bypassing your DNSBL tests
- VPN into your network
- Your webmail service

Thus it shouldn't matter if their hotel is blacklisted (many are).


Both Crackberry and Verizon force you to use their mail servers.   
Some other data providers are now doing transparent proxy on outbound  
e-mail.  In short, the user can't always control that.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness





Re: Advice on MTA blacklist

2007-10-09 Thread Chris Edwards
On Tue, 9 Oct 2007, Jo Rhett wrote:

| Both Crackberry and Verizon force you to use their mail servers.  Some other
| data providers are now doing transparent proxy on outbound e-mail.  In short,
| the user can't always control that.

True, to an extent.  I don't know about the *berry, but imagine/hope that 
verizon allow encrypted SMTP-AUTH out on the appropriate alternate port 
(465/587).  Do they ?

However, even assuming your user *is* using the *berry server or the 
verizon transparent proxy, then mails they send will in the main emerge 
from a legit mail server run by grown-ups, which is far far less likely to 
be blacklisted then a user sending direct from a hotel connection or 
mobile dynamic IP etc etc.



Re: Advice on MTA blacklist

2007-10-09 Thread Chris Edwards
On Tue, 9 Oct 2007, Jo Rhett wrote:

| Right, but transparent proxy of SMTP connections is available in even the
| lowest end firewalls now (like free ones you get with service).

OK.

|  And very few clients will complain if they aren't required to do SMTP 
| auth, which means that the user will never know that their session was 
| intercepted.

Yes again.

Of course the best solution is for clients to always submit on port 465/587, 
and hope that's allowed out by the hotels / mobile connectivity providers.

( as per the relevant recommendations )
 
Your server then enforces encryption and SMTP-AUTH, and the SSL will 
(hopefully) defeat any man-in-the-middle attacks by trans-proxies.



Re: Advice on MTA blacklist

2007-10-09 Thread Jo Rhett

On Oct 9, 2007, at 3:52 PM, Chris Edwards wrote:

However, even assuming your user *is* using the *berry server or the
verizon transparent proxy, then mails they send will in the main  
emerge
from a legit mail server run by grown-ups, which is far far less  
likely to

be blacklisted then a user sending direct from a hotel connection or
mobile dynamic IP etc etc.


Right, but transparent proxy of SMTP connections is available in even  
the lowest end firewalls now (like free ones you get with service).   
And very few clients will complain if they aren't required to do SMTP  
auth, which means that the user will never know that their session  
was intercepted.


Yes, this means man-in-the-middle is trivial.  No kidding.  Beat up  
the mail client creators.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness





Re: Advice on MTA blacklist

2007-10-09 Thread Jo Rhett

On Oct 9, 2007, at 4:22 PM, Chris Edwards wrote:
Of course the best solution is for clients to always submit on port  
465/587,
and hope that's allowed out by the hotels / mobile connectivity  
providers.


Fairly often not.  I've been lucky with T-Mobile, but Sprint and  
Verizon apparently block it randomly. East coast t-mobile users have  
had problems with blocking.



Your server then enforces encryption and SMTP-AUTH, and the SSL will
(hopefully) defeat any man-in-the-middle attacks by trans-proxies.


That's exactly the problem I am reporting.  A lot of mail clients  
don't enforce SSL connections, so man in the middle is silently  
accepted.  Only T-bird can be configured to not work any other way,  
TTBOMK.


And this is irrelevant for proprietary systems like Crackberry which  
use only their own servers, and Verizon which has modified software  
to use their own servers, etc etc.


As more and more people do more and more of their e-mail from hand- 
held devices, this problem only gets worse.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness





Re: Advice on MTA blacklist

2007-10-09 Thread mouss
Chris Edwards wrote:
 On Tue, 9 Oct 2007, Jo Rhett wrote:

 | Both Crackberry and Verizon force you to use their mail servers.  Some other
 | data providers are now doing transparent proxy on outbound e-mail.  In 
 short,
 | the user can't always control that.

 True, to an extent.  I don't know about the *berry, but imagine/hope that 
 verizon allow encrypted SMTP-AUTH out on the appropriate alternate port 
 (465/587).  Do they ?
   

mobiles are special (and *berry servers can be whitelisted if you need
that). but in the desktop domain, blocking 587 is plain silly. and even
if done, nothing prevents you from using an other port, say 10587. an
no, there is no universal proxy (people find it hard to proxy known
multi-channel protocols. how about proprietary ones ;-p).
 However, even assuming your user *is* using the *berry server or the 
 verizon transparent proxy, then mails they send will in the main emerge 
 from a legit mail server run by grown-ups, which is far far less likely to 
 be blacklisted then a user sending direct from a hotel connection or 
 mobile dynamic IP etc etc.

   

agreed.

I would also add that putting mail in a quarantine (be that a Junk
folder) doesn't help much if the said quarantine is so full of junk that
the recipient doesn't check it. and in this case, it is worst because
mail just disappeared (with an smtp reject, the sender has a chance to
notice, and maybe do something). So rejecting some spam at SMTP time
helps keeping the quarantine/Junk_folder usable.