public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Jan Knutar <jk-lkml@sci.fi>
To: Rik van Riel <riel@redhat.com>, Miles Bader <miles@gnu.org>
Cc: Matti Aarnio <matti.aarnio@zmailer.org>,
	Jan De Luyck <lkml@kcore.org>, <linux-kernel@vger.kernel.org>,
	<postmaster@vger.kernel.org>
Subject: Re: vger.kernel.org is listed by spamcop
Date: Thu, 22 Apr 2004 19:02:41 +0300	[thread overview]
Message-ID: <200404221902.41419.jk-lkml@sci.fi> (raw)
In-Reply-To: <Pine.LNX.4.44.0404212129510.17081-100000@chimarrao.boston.redhat.com>

On Thursday 22 April 2004 04:30, Rik van Riel wrote:
> On 22 Apr 2004, Miles Bader wrote:
> > Rik van Riel <riel@redhat.com> writes:
> > > I'm certain than vger got listed on spamcop due to linux-kernel
> > > subscribers reporting to spamcop some of the spam that leaked
> > > onto lkml, through Matti's strict filters.
> >
> > Does that mean that spamcop does no verification of user reports?
>
> Indeed.

A part of the fun begins from spamcop not even trying to maintain a list 
of open relays. Spamcop attempts to maintain a list of spam sources, 
where an IP gets listed if X number of spams have been reported from IP 
Y within time period Z.
Based on my by no means complete understanding of all the issues 
involved, the problem begins with the parser, there's no way to 
distinguish legitimate mailing list servers from a spammer's mailing 
list server without user intervention. When parsing the Received 
headers, (fx. the one in the mail I'm replying to), the parser sees 
that mx1.redhat.com threw it to vger, which for some reason passed it 
on to my ISP's mail server. The spamcop engine does not know why vger 
is relaying mail from redhat to my ISP, and checking the MX records 
reveals no justification for vger to be doing this, thus, the only 
thing it can reasonably trust, is my ISP's incoming smtp server, which 
reported it received the mail from vger. The scenario"ISP1 -> ISP2" it 
might still understand, but not this "ISP1 -> ???? -> ISP2" thing.

This is why spamcop users should not report spam sent to mailing lists.

> > I was under the impression that it's fairly easy to automatically
> > check whether a particular host is an open-relay or not, so it
> > would seem kind of irresponsible for spamcop not to do this if some
> > people are relying on their lists to do blocking (even if there's a
> > disclaimer saying not to do that, clearly people are ignorant or
> > dumb, so why not play it safe?).
>
> Spamcop isn't doing any vulnerability checks I'm aware of.

There are numerous RBL's which specifically list open relays (such as 
Blitzed's OPM), and spamcop is NOT one of them. Mail administrators 
need to understand that.
Supposedly, most of the spam traffic today goes through zombied machines 
running that Other OS, on consumer broadband connections. You can throw 
any amount of open proxy / relay checking at those spam sources, and 
find nothing. There are lists which try to list these exploited boxen 
as well (such as the XBL), but spamcop is not doing that, either, and 
mail administrators need to understand that. 

The advantage of spamcop is response-time. A spam source gets quickly 
listed, and falls off the list if spam is no longer reported from that 
source, based on a fully automated reporting system. The disadvantage 
is that it's only as reliable as its weakest link: the human factor, 
its users.
Anyone using spamcop RBL for outright blocking for an entire ISP has no 
clue about what they're doing. Using any single blacklist for outright 
blocking is a bit daft, IMO.

As a side-note, for each reported spam, spamcop tries to find a best 
contact email address in attempt to contact the administrator of what 
it thinks is the spam source, with links to pages with copies of the 
spam in question and output from the spamcop parser engine... I suspect 
spamcop sent this a few levels upstream of postmaster@vger.kernel.org, 
though :(


  reply	other threads:[~2004-04-22 17:26 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-04-21  5:22 vger.kernel.org is listed by spamcop Jan De Luyck
2004-04-21  8:44 ` Matti Aarnio
2004-04-21  8:56   ` Miles Bader
2004-04-21 10:07     ` Erik Mouw
2004-04-21 13:56     ` Graham Murray
2004-04-21 14:17       ` Richard B. Johnson
2004-04-21 14:39     ` Rik van Riel
2004-04-22  1:22       ` Miles Bader
2004-04-22  1:30         ` Rik van Riel
2004-04-22 16:02           ` Jan Knutar [this message]
2004-04-22 14:38         ` Timothy Miller
2004-04-21 15:34     ` H. Peter Anvin
2004-04-21 14:32 ` Rik van Riel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=200404221902.41419.jk-lkml@sci.fi \
    --to=jk-lkml@sci.fi \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lkml@kcore.org \
    --cc=matti.aarnio@zmailer.org \
    --cc=miles@gnu.org \
    --cc=postmaster@vger.kernel.org \
    --cc=riel@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox