Return-Path: X-Original-To: apmail-spamassassin-users-archive@www.apache.org Delivered-To: apmail-spamassassin-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 8395DBFB9 for ; Thu, 12 Jan 2012 07:37:35 +0000 (UTC) Received: (qmail 95518 invoked by uid 500); 12 Jan 2012 07:37:31 -0000 Delivered-To: apmail-spamassassin-users-archive@spamassassin.apache.org Received: (qmail 94484 invoked by uid 500); 12 Jan 2012 07:37:15 -0000 Mailing-List: contact users-help@spamassassin.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@spamassassin.apache.org Received: (qmail 94470 invoked by uid 99); 12 Jan 2012 07:37:13 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 12 Jan 2012 07:37:13 +0000 X-ASF-Spam-Status: No, hits=-0.7 required=10.0 tests=RCVD_IN_DNSWL_LOW,SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of robert@schetterer.org designates 212.52.224.206 as permitted sender) Received: from [212.52.224.206] (HELO mail02.mailspooler.com) (212.52.224.206) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 12 Jan 2012 07:37:05 +0000 Received: from [10.0.0.110] (host-88-217-137-181.customer.m-online.net [88.217.137.181]) (Authenticated sender: robert@schetterer.org) by mail.mailspooler.com (Postfix) with ESMTPSA id D794E8401A3 for ; Thu, 12 Jan 2012 08:36:44 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=schetterer.org; s=mail; t=1326353805; bh=q3jYnfL/6Bj9joyygQc7eUcuvkUaWrrsyLsz4G515xA=; h=Message-ID:Date:From:MIME-Version:To:Subject:References: In-Reply-To:Content-Type:Content-Transfer-Encoding; b=jw05n13RxaC85r+hDFxO0ECtWtgs1XxEUAR/iFAk/wqR24fIna+ZcdozD7VT4AXBX uVpxL4qUHH9ANdv08K38qy6fJ1zAjwQXiexT7I+TDJotxRy1LOnUAyOa/u4JnMK7rl Z7ER4qPxZtKZJfN2DygP8Ckqu3pqckuZkXzoYLDE= Message-ID: <4F0E8D8C.2080108@schetterer.org> Date: Thu, 12 Jan 2012 08:36:44 +0100 From: Robert Schetterer User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:9.0) Gecko/20111220 Thunderbird/9.0 MIME-Version: 1.0 To: users@spamassassin.apache.org Subject: Re: [OT] RBLs References: <013ed5d1-6b05-4fb6-8f37-f696823cdba9@office.splatnix.net> <4F0DF9C4.4080901@pacific.net> <4F0E0F0D.3020208@invaluement.com> In-Reply-To: <4F0E0F0D.3020208@invaluement.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org Am 11.01.2012 23:37, schrieb Rob McEwen: > On 1/11/2012 5:10 PM, David B Funk wrote: >> Problem with all those methods is that they're reactive, will not hit >> until -after- somebody has seen the bad crap and created filers, >> RBL-lists, taught Bayes, etc. >> >> The OP explicitly said that the first spam run was at 06:39 and by >> 06:42 it was hitting RBLs (pretty darned quick by my book;). >> However he has some fussy customers who weren't understanding and >> so was asking for a method of dealing with this. > > This is actually a good argument for having a variety of good IP and URI > DNSBLs. Even the fastest reacting ones are going to update, at most, > once per minute. (and even that is rather rare... I think most > fast-reacting ones update every ~5 minutes.) Even then, public DNSBLs > have to rsync from the master to mirrors before the data is usable. > > For this reason, you're going to hit some DNSBLs just seconds after they > updated... others are going to be a little less fresh. This is exactly > why having multiple quality DNSBLs is helpful. If you check 8 different > good ones instead of 2 different good ones (for example), then there is > a greater chance that you'll query one of those mere seconds after it > updated, and where it already had data on a new spam campaign. > > Along those lines, with the invaluement blacklists that I manage... > we're soon going to offer a special version whereby we send an alert to > "trigger" subscribers' rsyncs within a couple of seconds after each > invaluement list's last update--thus making that reaction time even > faster--and causing more spam that are at the "tip of the spear" to get > caught. > > ALSO: There are OFTEN times when an IP doesn't have a chance to get > caught, but it contains a domain already found on surbl, uribl, ivmURI, > or DBL. Or, times when a domain hadn't had a chance to get caught yet, > but the IP is caught from a previous spam campaign. But if you're not > using all the best DNSBLs, you miss out on some of this! > > MORE: And, btw, really good /24 blacklists do _preemptively_ block much > snowshoe spam, from the very 1st spam sent! > Hi Rob, read postfix archives about rbls, there are tons of info this all was discussed before, there is simply nothing "very" new about this theme, there might be "news" with comming up more use of ipv6 spam -- Best Regards MfG Robert Schetterer Germany/Munich/Bavaria