On Tue, 28 Nov 2006, John Rudd wrote:
> >> Received: from smtp-out-4101.amazon.com (207-171-180-184.amazon.com 
> >> [207.171.180.184])
> >>         by XXX (8.11.6/8.11.6) with ESMTP id kAS2XrV04185
> >>         for <XXX>; Mon, 27 Nov 2006 21:33:53 -0500
> > 
> > This was ugly, but you could put "amazon\.com" in botnet_serverwords to 
> > avoid it.
> 
> That one wont work, because the regex doesn't look at "the registered 
> domain + tld" (ie. amazon.com).  Adding "amazon\.com" to 
> botnet_serverwords would exempt "amazon.com.amazon.com" but not 
> "*.amazon.com".
> 
> The only way to exempt the amazon one would be to:
> 
> a) have me add a "domains to exempt" config, which means anyone who puts 
> that as the domain in their PTR record can abuse it (but it might be 
> worth it, as it would have to be done by the person who controls the 
> RDNS for that host, and thus is still out of the reach of the botnet hacker)
> 
> b) add that IP address, or IP address block (don't know how many of the 
> related IP addresses are owned by amazon or ebay) to botnet_pass_ip.

I like the idea of a "domains to exempt" config item, as it's easy to use, 
and allows simple "whitelisting" of major companies such as Amazon, ebay, 
paypal, apple, ibm, etc... As you mentioned, this is a botnet catching 
tool, so the reverse PTR trick is for other means of spam detection.  :)

Rob

Reply via email to