The reject-ip-in-cc-rdns feature exists because because the 
ip-in-rdns-keyword-file feature requires keywords and I only speak 
English.  Since I don't know how to say "dynamic" or "cable" or 
"residential" in different languages, I decided that a two-character 
country code would count as a keyword.  I fully understand if you think 
I'm conceited or even "typically American" to dismiss all foreigners as 
potential spammers. :)  The truth is, that solution happened to work for 
me because my users don't correspond (often) with people in foreign 
countries.  As the spamdyke mailing list grows however, I may have to 
remove that filter from my server.

Starting with version 3.1.0, spamdyke will allow top-level domains (like 
country codes) to be used as keywords for ip-in-rdns-keyword-file.  To 
block all connections from rDNS names that contain the IP address and 
end in the ".us" extension, for example, just add a line to your keyword 
file:
    .us
This was added for people who wanted to use reject-ip-in-cc-rdns but 
didn't want to filter every country code.

My list of keywords for ip-in-rdns-keyword-file is pretty long too.  
Please note: these are just the keywords I happen to use, don't assume 
that you should use them also.  Everything depends on your server, your 
users and your needs.  Here you go:
................................................................................
# Actual keywords
cable
client
cm
dhcp
dial
dialin
dialpool
dialup
din
dip
dip0
dup
dyn
dynamic
dynamicip
ev1s
in-addr
modem
ppp
pool
pools
reverse
user

# Specific providers with lots of spammers
adsl.totbb.net
adsl.proxad.net
fbx.proxad.net
hinet-ip.hinet.net
ip.secureserver.net
onocable.ono.com
res.rr.com
rev.gaoland.net
.telebecinternet.net
bb.sky.net
bb.sky.com
ptr.us.xo.net
.covad.net

adsl dsl .sbcglobal.net
adsl dsl .ameritech.net
adsl dsl .pacbell.net
adsl .bellsouth.net
wsip .cox.net
hsd1 .comcast.net
................................................................................

-- Sam Clippinger

Stefan Pausch wrote:
> Would you mind sharing your list? - I had my first false-positive with
> DENIED_IP_IN_(CC)_RDNS with hosteurope.de just yesterday.
>
> I disabled the DENIED_IP_IN_(CC)_RDNS feature, instead of whitelisting it.
> Shoud i reenable it (anyway what is it good for?)?
>
> --Stefan
>
>
>   
>> -----Ursprüngliche Nachricht-----
>> Von: [EMAIL PROTECTED] [mailto:spamdyke-users-
>> [EMAIL PROTECTED] Im Auftrag von Sam Clippinger
>> Gesendet: Donnerstag, 1. Mai 2008 04:39
>> An: spamdyke users
>> Betreff: Re: [spamdyke-users] DENIED_IP_IN_(CC)_RDNS
>>
>> I can't speak for anyone else, but those two filters have been very
>> good
>> for my users.  On a typical day, 30-60% of all connections to my server
>> are blocked with DENIED_IP_IN_CC_RDNS.  Another 5-20% are blocked by
>> DENIED_IP_IN_RDNS.  I've had to whitelist a few IP addresses with bad
>> rDNS names but that's been very rare so far (less than 5 total).
>>
>> However, servers with larger user populations and more international
>> correspondence might have different experiences.
>>
>> -- Sam Clippinger
>>
>> Marcin Orlowski wrote:
>>     
>>> Hi,
>>>
>>> Anyone by any chance did sort of research if DENIED_IP_IN_*_RDNS
>>>       
>> helps
>>     
>>> his users or causes more problems? I formerly thought that this is
>>> more helpful, as IP in RDNS is most likely appear for home dsls,
>>>       
>> dialups
>>     
>>> and other stuff not supposed to run smtp server i shall trust, and if
>>> it's my users mail netline, then they shall authenticate while
>>>       
>> talkign
>>     
>>> to me anyway. But now I see that some telecoms offer dsls with static
>>> IPs (contrary to dyniamic one, rotated 24hs, that is addressed to
>>>       
>> home
>>     
>>> users) which is primarily used by companies, and therefore it's less
>>> likely for them to be spam source (due to botnes, zombies etc). I
>>>       
>> even
>>     
>>> saw a data center which named their rack hosts that way. I therefore
>>> think that it might be extremely useful to try to build a kind of
>>> database of providers who one may consider whitelisting even, they
>>>       
>> would
>>     
>>> otherwise fall into IP_IN_RDNS or IP_IN_CC_RDNS trap. Any thoughts?
>>>
>>> Marcin
>>> _______________________________________________
>>> spamdyke-users mailing list
>>> [email protected]
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>
>>>       
>> _______________________________________________
>> spamdyke-users mailing list
>> [email protected]
>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>
>> __________ Information from ESET NOD32 Antivirus, version of virus
>> signature database 3068 (20080501) __________
>>
>> The message was checked by ESET NOD32 Antivirus.
>>
>> http://www.eset.com
>>     
>
>  
>
> __________ Information from ESET NOD32 Antivirus, version of virus signature
> database 3068 (20080501) __________
>
> The message was checked by ESET NOD32 Antivirus.
>
> http://www.eset.com
>  
>
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   
_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to