sean finney on 29 Apr 2004 19:03:04 -0000


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Hi


On Thu, Apr 29, 2004 at 11:34:30AM -0400, Kevin Brosius wrote:
> Received: from unknown (HELO default.in.icenetworld.com)
> (203.195.203.130)
>   by mail.netisland.net with SMTP; 29 Apr 2004 14:13:16 -0000
> 
> I've never seen mail from 'icenetworld.com' that I would consider valid
> from gr.  Or maybe he's got a new domain.  A quick lookup on it ought to
> tell you though.

note that just as From: headers can be forged, so can Recieved: headers,
and even so can the information put in the Recieved: header by your own
mail server.   if you trust the line itself (if it were put in by your
mail server), than you can with some certainty trust the ip address
in question, but the hostname in HELO could be anything.  anything past
the first Recieved: that you don't administer could be forged.

> >  This brings me this same problem I have on one of the lists I maintain
> >  with mailman. When they spoof the e-mail address, how would you block
> >  the IP address ranges being used by the spammers/compromised boxes?

dynamic realtime blackhole lists.  preferably in spamassassin rather
than the mta itself, because the former is a tad draconian.

On Thu, Apr 29, 2004 at 12:28:51PM -0400, John Lavin wrote:
> I would think that it would be useful in mailman to be able to discard
> by ip address.  It can discard by e-mail, but then you'd be banning the
> spoofed e-mail, not the spammer.

you want to manually maintain that by ip address?  have fun :)
seriously though, that's exactly what rbl's are designed to do.  they're
not always able to catch everything, and there is the risk of false
positives (which is why i'm against it at the mta level), but a well
thought out scheme using multiple distinct rbl services is highly
effective at catching the bulk of spam out there. 


	sean

Attachment: signature.asc
Description: Digital signature