[Dovecot] Odd Feature Request - RBL blacklist lookup to prevent authentication

Robin dovecot at r.paypc.com
Wed Oct 23 06:27:36 EEST 2013


On 10/22/2013 3:22 PM, Noel Butler wrote:
> But I agree with you on the rest, since of those 500K IP's Marc claims
> to have I'd bet that 99% are hijacked innocent pc's/servers, and of
> them, >75% would likely be a one time usage.

This accords with our own statistics.  While it IS tempting to treat 
every IP# that "spams" or hits you with a port-scan as something worthy 
of blackholing, the reality is that the vast majority of the attempts 
are from "innocent" victim hosts.

Now, there's little doubt that MOST of these are not legitimate MTA 
endpoints, and so "shouldn't" be issuing email directly to your MX 
hosts.  SPF + OpenDKIM are great, but only for those domains that 
actually use them; you can score "improperly delivered" emails bearing 
those domains with a policy defined by their operators, but many domains 
don't publish a policy.

I would caution people to avoid throwing out the baby with the 
bathwater.  I've been collecting an increasing number of "mysterious" 
email delivery problems to endpoints which do not issue DSN/bounces, 
*OR* provide any feedback to their users that emails have been "blocked".

The list includes some big names, like:

comcast (cable ISP subscribers)
secureserver.net hosted emails (GoDaddy's "hosted email" service, which 
uses Cloudmark's anti-spam solutions)
McAfee's "MXLogic" anti-spam services

McAfee's "SaaS/MXLogic" anti-spam service has a responsive false 
positive mediation system, whereas comcast's + GoDaddy's setups are 
thoroughly dysfunctional and broken.  Despite publishing SPF, fully 
specified OpenDKIM and using DomainKeys signing, having perfectly clean 
IP# reputations and not being on ANY RBLs, emails to those hosts is at 
best "random", or in comcast's case - when it's hosting "vanity domains" 
for its customers - completely broken.

I strongly suspect these inferior anti-spam systems are mistakenly 
ascribing fault for "Joe Jobbed" spam runs, even if they're delivered by 
non-compliant hosts as specified in the domain's SPF.  All of my clients 
"login" and issue emails through our MTAs, which are specified as 
permitted senders in SPF, so there are no "rogue" road warriors 
"allowed" by our domains' SPF policies.

My point is simple: it's easy to let frustration about spam get the 
better of you, but don't create worse problems for your users and those 
who try to legitimately reach them.  It's progressively making email 
less and less usable in a global context.

=R=


More information about the dovecot mailing list