Security Basics mailing list archives
Re: Final Words on "Educating RDNS violators" - Debunking the Myth's
From: Derek Schaible <dschaible () cssiinc com>
Date: Fri, 03 Sep 2004 08:47:42 -0400
My last thought on this issue: While LordInfidel's comments are true, I still advocate that DNS should be properly setup for any SMTP service. Many, many, many places do filter on this. Here's why: 1. First and foremost, it does tremendously aid in spam reduction *before* the messages reach your filtering program, thus reducing cpu cycles. 2. It does prevent a large number of email-borne viruses before they reach your virus scanner, thus reducing cpu cycles. Why do I say this, when we know it is not a virus scanner? Because like much spam, viruses are frequently sent out en masse from systems that will fail this simple rDNS test - stopping them from reaching the server. Of course this is no protection from a directed attack. But it makes your resources more efficient in some capacity to deal with a directed attack. And that's the name of the game. Now, it is true that this is far from a fool proof scheme but many of us use this method because a perfect system as of yet does not exist. This is one technique of many that you can employ. Some may argue that rDNS will block valid mail. There is that possibility. Consider, however, that virtually any filtering method has this possible side effect. I can only report that in my experience I've had no reports of missing valid customer email due to rDNS filtering. I have, however, lost valid customer email because they ended up on a blacklist erroneously, which can be difficult to be removed from, often taking up to 72 hours before your removal is successful! Any votes to stop the RBL movement? Another consideration: There are many debates over what will be the best method to stop spam. There is little agreement on what technology will eventually win. Many of these technologies will in some way or another rely on proper name resolutions. As a result, the day will inevitably come when all ISPs must provide accurate name services for their customers. Now is the best time to start anyway. Whether you like the thought that people such as myself employ rDNS filtering or not is moot. If you don't like, I'm still going to do it. I'm not the only one who will take this position either. The real answer is to demand proper service from your ISP in some manner. There are some places out there that don't provide this service and laziness really is the only excuse. And I am done with this thread. Still happily dropping mail via rDNS, - Derek On Tue, 2004-08-31 at 17:38, LordInfidel () directionweb com wrote:
There has been many a discussion on this list about RDNS relating to the security of mail servers. This is an attempt to dispel the myth's that have sprung up from this thread. First off, the use of RDNS boils down to the prevention of spam. Very few valid reasons for the use of RDNS and SMTP communication exists, and general security is not among those reasons. This (spam prevention) is the main reason why the developers of MTA products include it in their respective packages(exchange, procmail, qmail, sendmail, postfix). With that said, I urge ~ALL~ readers of this list, regardless of whether you are pro RDNS or con RDNS. Read the RFC's that govern e-mail transmissions; RFC821 and RFC822, (superseded by 2822 and 2821), so that you can make a well informed decision on whether or not to implement RDNS. http://www.faqs.org/rfcs/rfc2821.html; http://www.faqs.org/rfcs/rfc2822.html Readers should pay Particular attention to http://www.faqs.org/rfcs/rfc2821.html Section 7. Section 7 covers "Security Considerations" regarding electronic mail transmissions. Additional focus should be turned to 7.7, as it sums up the use of Mail Servers better then I could paraphrase it. Additionally the policy of rejecting e-mail for any reason is covered in Section 5.2.5 of rfc1123, which, as I stated in a previous e-mail, covers this quite explicitly. Rejecting mail based on RDNS (aka the failure to verify a mail servers identity) ~~~***VIOLATES***~~~ the RFC: http://www.faqs.org/rfcs/rfc1123.html
-- Derek Schaible <dschaible () cssiinc com> CSSI, Inc.
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- Final Words on "Educating RDNS violators" - Debunking the Myth's LordInfidel (Sep 02)
- Re: Final Words on "Educating RDNS violators" - Debunking the Myth's Derek Schaible (Sep 07)
- Re: Final Words on "Educating RDNS violators" - Debunking the Myth's Derek Schaible (Sep 08)
- <Possible follow-ups>
- RE: Final Words on "Educating RDNS violators" - Debunking the Myth's LordInfidel (Sep 08)
- RE: Final Words on "Educating RDNS violators" - Debunking the Myth's [?? Probable Spam] Derek Schaible (Sep 08)
- RE: Final Words on "Educating RDNS violators" - Debunking the Myth's David Gillett (Sep 10)
- Re: Final Words on "Educating RDNS violators" - Debunking the Myth's Gabriel Orozco (Sep 13)
