| Linode Forum https://forum.linode.com/ |
|
| Two Reverse DNS entries? https://forum.linode.com/viewtopic.php?f=19&t=7888 |
Page 2 of 2 |
| Author: | sweh [ Sun Oct 09, 2011 7:37 am ] |
| Post subject: | |
hybinet wrote: So, there are three things that REALLY matter:
- li12-34.members.linode.com should point to 1.2.3.4. - 1.2.3.4 should have the reverse DNS, li12-34.members.linode.com. - Your server should identify itself correctly as li12-34.members.linode.com. Actually that third entry isn't necessary either; the machine needs to identify itself as a valid DNS name, but not necessarily as a name that matches the originating IP address. This becomes important for multi-homed machines or machines with multiple IP addresses each of which may be used for originating traffic. Heck, maybe even IP4 and IP6 with different DNS names for each address. In these instances the sending machine can not always guarantee that the HELO (or EHLO) value matches the originating IP address. Any receiving machine that requires the HELO name matches the IP address is broken. The receiving machine may validate that the DNS name provide is valid (many home machines just use their local hostname, and so they get rejected; drop a lot of spam that way!) but it should not attempt to match that to the IP address. Now you might say "the sending machine can send a HELO value that matches the IP address" but: 1) this doesn't happen in real life. sendmail,postfix etc use the same value no matter what IP address you talk on 2) this value is used for simple "loopback" detection. If I'm called "foo.bar" and I connect to a machine that identifies itself as "foo.bar" then I can immediately abort; I'm talking to myself! |
|
| Author: | hoopycat [ Sun Oct 09, 2011 9:20 am ] |
| Post subject: | |
My mail acceptance rules are currently: - HELO is required and logged, but it is not checked for legitimacy (false positive rate too high). - Envelope sender must have a valid FQDN which must exist - Envelope recipient must have a valid FQDN which must exist and must be a local destination - The sending server must not be in an internal DNSBL or a handful of external *BLs[1], and a DNS query for its IP address must return a hostname which, when queried, returns the IP address. A handful of exceptions exist. [1] These include one which blocks all domains registered within the past 5 days. A couple important takeaways from this: - I cannot reject based on bad HELO without rejecting a lot of valid mail. - I cannot reject outright on forward/reverse DNS failure: I must defer due to the possibility of transient errors, and even with that, I have exceptions for notifications from $bank, my cellphone carrier's SMS-to-email gateways, the Department of Education, etc. Obviously, others may have more restrictive policies and/or use scoring to divert messages to a spambucket that I would otherwise accept (indeed, so do I), but this is as good as I can do without losing legitimate mail. So, don't sweat the actual hostname used (I send out as framboise.hoopycat.com), nor the contents of HELO (the Linode threshold alert e-mail I just got was sent from mail.linode.com, which HELO'd as "www.linode.com"). Just make sure they're set to something and your message will make it to the next level of validation. It probably won't make it through the next level of validation, of course, but that's mostly because the average e-mail I receive is trying to sell me Canadian pills to enlarge my national lottery's late Minister of Finance's free iPhone 5. Code: smtpd_helo_required = yes |
|
| Author: | sweh [ Sun Oct 09, 2011 9:27 am ] |
| Post subject: | |
I used to have complex rules, but got bored of maintaining whitelists 'cos various companies (eg Banks!) can't run an infrastructure properly. *sigh* Currently my rules are: Code: smtpd_restriction_classes = The "recipient" hash just has "my_domain sweh_restrictions" so that mail sent my domain runs the extra checks; mail not sent to my domain will skip them and fail the unauth_destination check. The "sender" hash is a white/black list so I can short-circuit deny morons, or whitelist people that would otherwise fail. eg a blacklist and a whitelist entry Code: fortunoff@news.fortunoff.com 554 Fuck off spammers - see if I spend money with you again! |
|
| Author: | hoopycat [ Sun Oct 09, 2011 10:42 am ] |
| Post subject: | |
sweh wrote: I used to have complex rules, but got bored of maintaining whitelists 'cos various companies (eg Banks!) can't run an infrastructure properly. *sigh*
This suggests a rule of thumb: Make your e-mail appear less dodgy and suspicious than e-mails from a legitimate bank, and you should be alright. Also, be sure to add stmtnotifyacct@mgate218.bancorpfb.bulkmails0lutns4u.biz to your address book! |
|
| Page 2 of 2 | All times are UTC-04:00 |
| Powered by phpBB® Forum Software © phpBB Group http://www.phpbb.com/ |
|