Slightly OT: sfm-sav milter
Dennis Willson
taz at taz-mania.com
Fri Dec 1 23:14:32 GMT 2006
Actually smf-sav is SUPPOSE to do an mx lookup (and the code is in
there) to do the sender verification.
I've tested this and it works on mine. Since so many large ISPs (and
myself) don't send and receive from the same server and the sending
server doen't actually know the recipients it would break sav if it
didn't do the mx lookup.
Normally smf-sav does mx lookups of the mail-from and uses the
mailertable to do the rcpt-to lookup.
On Fri, 1 Dec 2006 13:23:46 -0900
"Kevin Miller" <Kevin_Miller at ci.juneau.ak.us> wrote:
>I just posted the following to the smf-sav list, but thought I'd give
>folks here a heads up too, since I know some are using smf-sav
>milter...
>
>===========
>The spammers are up to their old tricks apparently. I noticed this
>in
>my logs today:
>
>-------------------------------------------------
>Nov 30 19:06:23 mx2 smf-sav[22911]: sender check succeeded:
><burlkevin_miller at ci.juneau.ak.us>, 124.120.38.30,
>ppp-124.120.38.30.revip2.asianet.co.th, [00:00:03]
>Nov 30 19:06:24 mx2 smf-sav[22911]: recipient check failed:
><burlkevin_miller at ci.juneau.ak.us>, 124.120.38.30,
>ppp-124.120.38.30.revip2.asianet.co.th,
><burlkevin_miller at ci.juneau.ak.us>, [00:00:00]
>-------------------------------------------------
>
>There are numerous entries where they use some phoney address as the
>from=, which generally fail. I guess they figured they'd have a
>better
>chance of getting their spam through if they forged an address from
>my
>domain, but configured their server to verify it.
>
>There's nobody here called burlkevin_miller at ci.juneau.ak.us (as
>evidenced by the recipient check failing) so they must be configuring
>their server to validate the address during the callback. I'm not
>sure
>how the callback works; apparently it just queries the server that is
>attempting to send rather than looking up the valid mx servers in DNS
>and querying them which might be a better way to do the sender
>verifications. I don't know what that would do to overhead or if it
>would break any rules.
>
>If the spammer used both a valid sender and recipient id their spam
>would get through (although most likely it would then be caught by
>other
>spam filters). This may be a case of spam being reflected off a
>valid
>domain instead of actually being targeted to me. Who knows?
>
>At any rate, it seems the spammers have figured out a way to spoof
>sender verification. It's a sure thing I don't have any email
>servers
>in asia...
>
>...Kevin
>--
>Kevin Miller Registered Linux User No: 307357
>CBJ MIS Dept. Network Systems Admin., Mail Admin.
>155 South Seward Street ph: (907) 586-0242
>Juneau, Alaska 99801 fax: (907 586-4500
>
>--
>MailScanner mailing list
>mailscanner at lists.mailscanner.info
>http://lists.mailscanner.info/mailman/listinfo/mailscanner
>
>Before posting, read http://wiki.mailscanner.info/posting
>
>Support MailScanner development - buy the book off the website!
--------------------------------------------------
Dennis Willson
taz at taz-mania.com
http://www.taz-mania.com
Ham (Extra Class): ka6lsw
Scuba: Rescue Diver, EANx, Wreck, Night, Alt, Equip, UW Photographer,
Gas Blender
Owner: Kepnet Internet Services
Life should not be a journey to the grave with the intention of
arriving safely in a nice looking and well preserved body, but rather
to skid in broadside, thoroughly used up, totally worn out, and loudly
proclaiming, "WOW! WHAT A RIDE!"
More information about the MailScanner
mailing list