Clunk Werclick wrote: > Howdie; > > I'm starting to see plenty of these and they are new to us: > > zgrep "address not listed" /var/log/mail.info > Sep 3 05:26:59 ....: warning: 222.252.239.56: address not listed for > hostname localhost > dig -x 222.252.239.56 > > ... > ;; QUESTION SECTION: > ;56.239.252.222.in-addr.arpa. IN PTR > > ;; ANSWER SECTION: > 56.239.252.222.in-addr.arpa. 83651 IN PTR localhost. > ... > > Taking to one side the various RBL's which are catching these, and not > going the whole 'PTR must match' route - would it be practical to craft > a 10 point rule based on PTR = localhost? Is it even possible to build a > rule based upon DNS returns? > > Forgive the stupidity of the question, but I'm not sure how to, or even > if it can be implemented? Not without writing a plugin. Although if your MTA inserts a "may be forged" note into the Received: headers, SA will pick up on this.
Generally speaking, SA does not perform A record lookups of anything that could be spammer-provided, neither hosts in URLs nor Received: hosts. Doing so posses a potential security risk. (NS record queries are performed, but not A). Attack vectors include: 1) malicious insertion of hosts that are slow-to-resolve, forcing a DNS timeout, thus slowing down mail processing. A small flood of such messages (each with different hostnames) could readily occupy all your spamd children. Spamd does not have sufficient cross child co-ordination to implement countermeasures, and anyone using the API or "spamassassin" script would have to roll their own. 2) there is the potential to abuse chosen queries to facilitate DNS cache poisoning attacks, on servers that are vulnerable.