>> >...
>> 
>>      A similar idea, without the "back-channel" flaw is to test the
>> domain for either 'CNAME' or 'A' record `wildcards' (as in the command
>> "dig '*.spammer_domain.tld' a" and "dig '*.spammer_domain.tld' cname").
>> This is an excellent spam sign (the host portion of the name is often
>> mapped back into a database to determine the actual recipient).  Legitimate
>> domains will use wildcards for 'NS', 'MX' and even occasionally for some
>> more obscure records, but an 'A' or 'CNAME' record is nearly always a
>> spammer.
>> 
>>      Check this out with any spam you've gotten with a hostname other
>> than "www" (about 70% of what I see).
>
>ooh, interesting trick, thanks Paul!   have you got any idea of
>how much spam hits this?
>
>a great way to make life harder for spammers ;)
>
>- --j.
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.2.5 (GNU/Linux)
>Comment: Exmh CVS
>
>iD8DBQFCknqJMJF5cimLx9ARAjP/AJ9MI1R577iNtzrs1nWWuT4IgX05yQCfROq/
>qMMm1iD9xxIP6g4rEV9/mxw=
>=JOJg
>-----END PGP SIGNATURE-----
>
>
        Looks like I slightly over estimated.  I just checked the last
40 spams I received.  After ignoring 419s, stock pumps and phishing I
found 14 without wildcards and 21 with - exactly 60% (only one had a
'CNAME' wildcard, the rest were all 'A' record wildcards).  Much to my
surprise, I tested them all and of the 21 wildcards, 13 used "www.subdomain"
to match the wildcard.  I've never seen a case of a valid domain using
them for 'A' or 'CNAME' records, but I can think up (admittedly marginal)
cases where an administrator might want to for a subdomain of a SLD - I
can't come up with a single reason to use them on a SLD itself, but maybe
someone else can.

        So the answer looks like 60% with 0% FPs.  (But what I get is
very biased because of the large amount of filtering at both the MTA
level and in front of SA.)  If a few other people could test and report
that would probably be helpful.


        Paul Shupak
        [EMAIL PROTECTED]

Reply via email to