On Wed, 05 Jan 2011 18:40:41 -0330
"Lawrence @ Rogers" <lawrencewilli...@nl.rogers.com> wrote:


> I would suspect that you are using non-standard rules. What's most 
> concerning is the old p0f rules that are looking for Windows XP. That
> is dangerous and a bad thing to use as a rule (the OS of the sender).

Aside from BOTNET_WIN the p0f rules are low-scoring and add-up to zero.

Since BOTNETS are 100% Windows it doesn't seem unreasonable to use p0f
in a metarule. However, you might want to look into this inconsistency:


0.5 L_P0F_W        Relayed through Windows OS except Windows XP
1.6 BOTNET_WIN     Mail from Windows XP which seems to be in a Botnet

> I would remove the p0f and botnet rules if I were you. That would
> solve your problem.

The BOTNET rules added-up to 4.1 points which is a bit high IMO. Also
BOTNET overlaps with  RDNS_DYNAMIC (and RDNS_NONE). If you had scored
down RDNS_DYNAMIC and shaved a point or two off the BOTNET rules, it
would have  been well under threshold.

BOTNET provide a useful full circle dns test, I'd keep it unless you
use such a test to reject.

Reply via email to