gabriel rosenkoetter on 30 Apr 2004 11:58:02 -0000


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Hi


On Thu, Apr 29, 2004 at 12:21:39PM -0400, Magnus Hedemark wrote:
> 1) Use some of the well maintained blacklists to stop the mail from ever 
> hitting the server.

"Well maintained blacklists" is an oxymoron in my experience.

> 2) Use software on the mail server to block this from ever getting to 
> Mailman.  This should be comprised of both antivirus software and antispam 
> software.

The PLUG mail server doesn't have the horsepower to do this. It's
enough of a strain keeping up with list mail. Please to be filtering
your own spam, thanks.

> In the absence of that on the Mailman server here, you're on your own.  I 
> had been whitelisting PLUG traffic but I'm forced to rethink that now.

I don't understand why, but I don't really care.

On Fri, Apr 30, 2004 at 12:20:26AM -0000, Greg Sabino Mullane wrote:
> I set a limit on the message size and reject HTML emails. Catches just
> about everything.

That's a very practical suggestion that MCT should consider.

On Thu, Apr 29, 2004 at 09:26:08PM -0400, sean finney wrote:
> yeah, look at the Recieved header of this email :)

Yes, let's do:

> Received: from unknown (HELO seanwashere) (66.92.235.189)
>   by mail.netisland.net with SMTP; 30 Apr 2004 01:24:33 -0000

You can spoof the HELO/EHLO name. You can't spoof the IP address
that any sane MTA also records unless you've done arp spoofing to
the router directly upstream from that MTA. That would be...
difficult. Oh, you might want to upgrade your OpenSSH version, Sean,
unless Debian's pulled the 3.7 patches back to its 3.6.

But you can certainly send your spam through an open mail relay that
*also* sends legitimate mail (and, thus, would be wrong to have in
an RBL, even though they frequently are), relay mail through a
random Windows PC infected with some virus (which won't be at the
same IP address for long, so adding it to an RBL doesn't actually do
much good unless you want to block the whole netblock, in which case
you may block mail from responsible users who choose not to use
their ISP's SMTP mail relay), or send mail from an Internet cafe
(you know the instance I speak of, Sean; it was on /. not too long
ago, in which case... you get the idea).

RBLs don't actually work, especially when you let other people
who you don't know manage them. And doing the checks is
indescribably expensive, relative to just accepting the mail,
especially at SMTP time, and if you take too long then, legitimate
clients may hang up on you.

Incidentally, I do know a thing or two about spam and SMTP traffic.
See http://eclipsed.net/~gr/spam.log. That's just what my filters
catch; i've got about 90% hit rate and <1% false positives (don't
think I've had one in two months). I'm about to spend ~$7.5k at work
for a system capable of rejecting spam and viruses at SMTP time
(that is, issue a 550, rather than ever even claim you'll deliver
the mail). It's going to take a dual Xeon and at the very least 2 GB
of RAM to do this fast enough to avoid losing legitimate SMTP
connections (and mail is never even touching disk on this system).

-- 
gabriel rosenkoetter
gr@eclipsed.net

Attachment: pgpVYKY4WT9pD.pgp
Description: PGP signature