From: Cliff Galiher - MVP on
It depends on what you define as "false positives."

I, for one, do not *want* to receive any email from any dynamic IP. A
dynamic IP, by definition, is dynamic. Sure, a business may be sending
email from a dynamic IP one day and that mail is legitimate, but then the
next day (because the IP is dynamic) that IP gets assigned to a
botnet-infected laptop. Why in the *world* should I accept email from any
dynamic IP? EVER?!?

In short, there is a cost to being in business. And a business should
expect to pay for at *least* one of the following:

1) A static IP. You say there are a few static IPs on zen's XBL list. That
list is built with ISP's cooperation so if an IP gets on there it is because
the ISP has reported to zen that it is dynamic. In all my years of using
zen (and I have a few clients that pay and rsync, so my stats are pretty
accurate) I've seen *ONE* static mistakenly get on the list. And it was
easily reported, confirmed with the ISP as a mistake, and removed.

2) If a business cannot get a static IP, either for financial reasons (which
I'd almost be tempted to call shennanigans on) or because the ISP doesn't
offer static (more common in some areas of the world where IP addresses are
a sought-after commodity) then there are still inexpensive (and sometimes
free via the ISP) mail relays. And the *relays* have static IPs so they
also will not get hit by zen's inclusion of XBL.

Non-businesses, similarly, still apply. If ta user sends through gmail
then the gmail servers handle final delivery, and that is static. The only
way the mail will appear to come from their dynamic address is if they set
up an email server in their home *AND* are not sending through an authorized
relay/mail-forwarder.

....now, remind me again why I should trust mail coming from a random
home-user who decided to set up a mailserver from his home? Why should I
assume that it isn't spam???

Part of the reasoning behind the XBL is assigning a level of trust, and
dynamic IPs show a complete unwillingness form the sender to take any steps
to add trust to their email. I, for one, have no problems blocking such
email on a blanket basis. And as of yet, that has never caused an issue in
receiving legitimate emails for myself or any of my clients.

-Cliff


"Milhouse Van Houten" <btvs(a)myrealbox.com> wrote in message
news:#W5JJwG2KHA.3856(a)TK2MSFTNGP04.phx.gbl...
> "Ace Fekay [MVP-DS, MCT]" <aceman(a)mvps.RemoveThisPart.org> wrote in
> message news:#vhI3LlyKHA.2644(a)TK2MSFTNGP04.phx.gbl...
>>
>> I believe instead of just using sbl.spamhaus.org, you may want to use
>> zen.spamhaus.org, which combines all Spamhaus IP-based DNSBLs into one
>> single comprehensive blocklist to make querying faster and simpler. It
>> contains the SBL, SBLCSS, XBL, CBLand PBL blocklists. Since it's a
>> consolidated list, use it alone without any of the other Spahaus RBLs.
>> http://www.spamhaus.org/zen/index.lasso
>>
>> I like SpamRats, too, wihch works nicely.
>> Spam Rats!
>> www.spamrats.com/about.php
>
> I'm a little confused by the recommendations for zen.spamhaus.org that
> I've seen here. Since every dynamic IP on the Internet is on the PBL list
> (and some static too), and since not everyone is configured to
> authenticate when sending mail (e.g. Comcast does not require SMTP
> authentication on their server for mail sent *from Comcast's network*, and
> there are millions of people on Comcast), aren't you setting yourself up
> for guaranteed false positives? And not necessarily a few, either,
> particularly if you get mail from non-business users. XBL can block all
> sorts of people too, according to their FAQ, though it doesn't sound as
> bad.
>
> It seems like the only safe one of Spamhaus's is the SBL, which deals with
> known entities.
>
> Spamcop.net's doesn't exactly comfort either, with its statement "The SCBL
> is aggressive and often errs on the side of blocking mail." I would think
> that they'd want to err on the opposite side, but maybe that's just me,
> with a reflex response to hearing from people who aren't getting their
> mail.
>
> Finally, zen.spamhaus.org carries this warning, which I don't full
> understand beyond it being yet another thing to worry about: "Because ZEN
> includes the XBL and PBL lists, do not use ZEN on smarthosts or SMTP AUTH
> outbound servers for your own customers (or you risk blocking your own
> customers). Do not use ZEN in filters that do any �deep parsing� of
> Received headers, or for anything other than checking IP addresses that
> hand off to your mailservers."
>
> Am I missing something?

From: SuperGumby [SBS MVP] on
I agree with most of what you say however look at the email address I use
for 'that most important other list'.

I continue to run my own server on DYNDNS. OK, it's the LoungeAN rather than
a business network.
I have never had a problem (that I was made aware of) by being on dynamic
IP.

Yes, business should consider the additional cost of Static IP.

"Cliff Galiher - MVP" <cgaliher(a)gmail.com> wrote in message
news:B54AEDF7-6ED0-4359-87A8-F2AAFCBD3966(a)microsoft.com...
> It depends on what you define as "false positives."
>
> I, for one, do not *want* to receive any email from any dynamic IP. A
> dynamic IP, by definition, is dynamic. Sure, a business may be sending
> email from a dynamic IP one day and that mail is legitimate, but then the
> next day (because the IP is dynamic) that IP gets assigned to a
> botnet-infected laptop. Why in the *world* should I accept email from
> any dynamic IP? EVER?!?
>
> In short, there is a cost to being in business. And a business should
> expect to pay for at *least* one of the following:
>
> 1) A static IP. You say there are a few static IPs on zen's XBL list.
> That list is built with ISP's cooperation so if an IP gets on there it is
> because the ISP has reported to zen that it is dynamic. In all my years
> of using zen (and I have a few clients that pay and rsync, so my stats are
> pretty accurate) I've seen *ONE* static mistakenly get on the list. And
> it was easily reported, confirmed with the ISP as a mistake, and removed.
>
> 2) If a business cannot get a static IP, either for financial reasons
> (which I'd almost be tempted to call shennanigans on) or because the ISP
> doesn't offer static (more common in some areas of the world where IP
> addresses are a sought-after commodity) then there are still inexpensive
> (and sometimes free via the ISP) mail relays. And the *relays* have
> static IPs so they also will not get hit by zen's inclusion of XBL.
>
> Non-businesses, similarly, still apply. If ta user sends through gmail
> then the gmail servers handle final delivery, and that is static. The
> only way the mail will appear to come from their dynamic address is if
> they set up an email server in their home *AND* are not sending through an
> authorized relay/mail-forwarder.
>
> ...now, remind me again why I should trust mail coming from a random
> home-user who decided to set up a mailserver from his home? Why should I
> assume that it isn't spam???
>
> Part of the reasoning behind the XBL is assigning a level of trust, and
> dynamic IPs show a complete unwillingness form the sender to take any
> steps to add trust to their email. I, for one, have no problems blocking
> such email on a blanket basis. And as of yet, that has never caused an
> issue in receiving legitimate emails for myself or any of my clients.
>
> -Cliff
>
>
> "Milhouse Van Houten" <btvs(a)myrealbox.com> wrote in message
> news:#W5JJwG2KHA.3856(a)TK2MSFTNGP04.phx.gbl...
>> "Ace Fekay [MVP-DS, MCT]" <aceman(a)mvps.RemoveThisPart.org> wrote in
>> message news:#vhI3LlyKHA.2644(a)TK2MSFTNGP04.phx.gbl...
>>>
>>> I believe instead of just using sbl.spamhaus.org, you may want to use
>>> zen.spamhaus.org, which combines all Spamhaus IP-based DNSBLs into one
>>> single comprehensive blocklist to make querying faster and simpler. It
>>> contains the SBL, SBLCSS, XBL, CBLand PBL blocklists. Since it's a
>>> consolidated list, use it alone without any of the other Spahaus RBLs.
>>> http://www.spamhaus.org/zen/index.lasso
>>>
>>> I like SpamRats, too, wihch works nicely.
>>> Spam Rats!
>>> www.spamrats.com/about.php
>>
>> I'm a little confused by the recommendations for zen.spamhaus.org that
>> I've seen here. Since every dynamic IP on the Internet is on the PBL list
>> (and some static too), and since not everyone is configured to
>> authenticate when sending mail (e.g. Comcast does not require SMTP
>> authentication on their server for mail sent *from Comcast's network*,
>> and there are millions of people on Comcast), aren't you setting yourself
>> up for guaranteed false positives? And not necessarily a few, either,
>> particularly if you get mail from non-business users. XBL can block all
>> sorts of people too, according to their FAQ, though it doesn't sound as
>> bad.
>>
>> It seems like the only safe one of Spamhaus's is the SBL, which deals
>> with known entities.
>>
>> Spamcop.net's doesn't exactly comfort either, with its statement "The
>> SCBL is aggressive and often errs on the side of blocking mail." I would
>> think that they'd want to err on the opposite side, but maybe that's just
>> me, with a reflex response to hearing from people who aren't getting
>> their mail.
>>
>> Finally, zen.spamhaus.org carries this warning, which I don't full
>> understand beyond it being yet another thing to worry about: "Because ZEN
>> includes the XBL and PBL lists, do not use ZEN on smarthosts or SMTP AUTH
>> outbound servers for your own customers (or you risk blocking your own
>> customers). Do not use ZEN in filters that do any �deep parsing� of
>> Received headers, or for anything other than checking IP addresses that
>> hand off to your mailservers."
>>
>> Am I missing something?
>


From: Leythos on
In article <#W5JJwG2KHA.3856(a)TK2MSFTNGP04.phx.gbl>, btvs(a)myrealbox.com
says...
> I'm a little confused by the recommendations for zen.spamhaus.org that I've
> seen here. Since every dynamic IP on the Internet is on the PBL list (and
> some static too), and since not everyone is configured to authenticate when
> sending mail (e.g. Comcast does not require SMTP authentication on their
> server for mail sent *from Comcast's network*, and there are millions of
> people on Comcast), aren't you setting yourself up for guaranteed false
> positives? And not necessarily a few, either, particularly if you get mail
> from non-business users. XBL can block all sorts of people too, according to
> their FAQ, though it doesn't sound as bad.
>
> It seems like the only safe one of Spamhaus's is the SBL, which deals with
> known entities.
>

While you COULD accept email from Dynamic ranges, there is no way that
I'm going to let my own or my customers servers accept email from known
dynamic ranges. Almost all email sent from a dynamic IP is spam, and for
those on a Dynamic IP they are almost always provided with a means to
relay through their providers servers.

Zen is just one of several that I use in addition to the UTM spam filter
in our firewalls.

--
You can't trust your best friends, your five senses, only the little
voice inside you that most civilians don't even hear -- Listen to that.
Trust yourself.
spam999free(a)rrohio.com (remove 999 for proper email address)
From: Cliff Galiher - MVP on
SG: As I said, the XBL is built by *active* ISP participation. Spamhaus
doesn't go out and search for dynamic IPs. They offer the XBL so that ISPs
that *want* their dynamic IPs blocked can report their IP blocks. :)

In short, if a dynamic IP is on the XBL list then it means that the ISP
already doesn't want the person doing whatever they are doing to get
blocked. That *also* means that the person getting blocked is probably also
breaking a "terms of service" with their ISP so their problems are greater
than being on the XBL list. They are at risk of having their service
disconnected. Verizon, for example, is becoming increasingly aggressive in
enforcing TOS on running servers on residential (aka dynamic IP) accounts.
Comcast is not far behind.

So yes SG, I'm not completely callous to the plight of some people who have
unique situations. So I do know where you are coming from, but at the same
time, if I started getting a ton of spam from dynamic IPs on an Austrailian
ISP, I'd still want your ISP to be a bit proactive in controlling their
network...including outbound filtering and adding residential connections to
the XBL list. But so far, y'all don't seem to have a lot of spammers
operating out there, so it is a non-issue. ;)

-Cliff


"SuperGumby [SBS MVP]" <not(a)your.nellie> wrote in message
news:#Qv0INJ2KHA.4912(a)TK2MSFTNGP06.phx.gbl...
> I agree with most of what you say however look at the email address I use
> for 'that most important other list'.
>
> I continue to run my own server on DYNDNS. OK, it's the LoungeAN rather
> than a business network.
> I have never had a problem (that I was made aware of) by being on dynamic
> IP.
>
> Yes, business should consider the additional cost of Static IP.
>
> "Cliff Galiher - MVP" <cgaliher(a)gmail.com> wrote in message
> news:B54AEDF7-6ED0-4359-87A8-F2AAFCBD3966(a)microsoft.com...
>> It depends on what you define as "false positives."
>>
>> I, for one, do not *want* to receive any email from any dynamic IP. A
>> dynamic IP, by definition, is dynamic. Sure, a business may be sending
>> email from a dynamic IP one day and that mail is legitimate, but then the
>> next day (because the IP is dynamic) that IP gets assigned to a
>> botnet-infected laptop. Why in the *world* should I accept email from
>> any dynamic IP? EVER?!?
>>
>> In short, there is a cost to being in business. And a business should
>> expect to pay for at *least* one of the following:
>>
>> 1) A static IP. You say there are a few static IPs on zen's XBL list.
>> That list is built with ISP's cooperation so if an IP gets on there it is
>> because the ISP has reported to zen that it is dynamic. In all my years
>> of using zen (and I have a few clients that pay and rsync, so my stats
>> are pretty accurate) I've seen *ONE* static mistakenly get on the list.
>> And it was easily reported, confirmed with the ISP as a mistake, and
>> removed.
>>
>> 2) If a business cannot get a static IP, either for financial reasons
>> (which I'd almost be tempted to call shennanigans on) or because the ISP
>> doesn't offer static (more common in some areas of the world where IP
>> addresses are a sought-after commodity) then there are still inexpensive
>> (and sometimes free via the ISP) mail relays. And the *relays* have
>> static IPs so they also will not get hit by zen's inclusion of XBL.
>>
>> Non-businesses, similarly, still apply. If ta user sends through gmail
>> then the gmail servers handle final delivery, and that is static. The
>> only way the mail will appear to come from their dynamic address is if
>> they set up an email server in their home *AND* are not sending through
>> an authorized relay/mail-forwarder.
>>
>> ...now, remind me again why I should trust mail coming from a random
>> home-user who decided to set up a mailserver from his home? Why should I
>> assume that it isn't spam???
>>
>> Part of the reasoning behind the XBL is assigning a level of trust, and
>> dynamic IPs show a complete unwillingness form the sender to take any
>> steps to add trust to their email. I, for one, have no problems blocking
>> such email on a blanket basis. And as of yet, that has never caused an
>> issue in receiving legitimate emails for myself or any of my clients.
>>
>> -Cliff
>>
>>
>> "Milhouse Van Houten" <btvs(a)myrealbox.com> wrote in message
>> news:#W5JJwG2KHA.3856(a)TK2MSFTNGP04.phx.gbl...
>>> "Ace Fekay [MVP-DS, MCT]" <aceman(a)mvps.RemoveThisPart.org> wrote in
>>> message news:#vhI3LlyKHA.2644(a)TK2MSFTNGP04.phx.gbl...
>>>>
>>>> I believe instead of just using sbl.spamhaus.org, you may want to use
>>>> zen.spamhaus.org, which combines all Spamhaus IP-based DNSBLs into one
>>>> single comprehensive blocklist to make querying faster and simpler. It
>>>> contains the SBL, SBLCSS, XBL, CBLand PBL blocklists. Since it's a
>>>> consolidated list, use it alone without any of the other Spahaus RBLs.
>>>> http://www.spamhaus.org/zen/index.lasso
>>>>
>>>> I like SpamRats, too, wihch works nicely.
>>>> Spam Rats!
>>>> www.spamrats.com/about.php
>>>
>>> I'm a little confused by the recommendations for zen.spamhaus.org that
>>> I've seen here. Since every dynamic IP on the Internet is on the PBL
>>> list (and some static too), and since not everyone is configured to
>>> authenticate when sending mail (e.g. Comcast does not require SMTP
>>> authentication on their server for mail sent *from Comcast's network*,
>>> and there are millions of people on Comcast), aren't you setting
>>> yourself up for guaranteed false positives? And not necessarily a few,
>>> either, particularly if you get mail from non-business users. XBL can
>>> block all sorts of people too, according to their FAQ, though it doesn't
>>> sound as bad.
>>>
>>> It seems like the only safe one of Spamhaus's is the SBL, which deals
>>> with known entities.
>>>
>>> Spamcop.net's doesn't exactly comfort either, with its statement "The
>>> SCBL is aggressive and often errs on the side of blocking mail." I
>>> would think that they'd want to err on the opposite side, but maybe
>>> that's just me, with a reflex response to hearing from people who aren't
>>> getting their mail.
>>>
>>> Finally, zen.spamhaus.org carries this warning, which I don't full
>>> understand beyond it being yet another thing to worry about: "Because
>>> ZEN includes the XBL and PBL lists, do not use ZEN on smarthosts or SMTP
>>> AUTH outbound servers for your own customers (or you risk blocking your
>>> own customers). Do not use ZEN in filters that do any 'deep parsing' of
>>> Received headers, or for anything other than checking IP addresses that
>>> hand off to your mailservers."
>>>
>>> Am I missing something?
>>
>
>
From: Milhouse Van Houten on
"Cliff Galiher - MVP" <cgaliher(a)gmail.com> wrote in message
news:B54AEDF7-6ED0-4359-87A8-F2AAFCBD3966(a)microsoft.com...
>
> Non-businesses, similarly, still apply. If ta user sends through gmail
> then the gmail servers handle final delivery, and that is static. The
> only way the mail will appear to come from their dynamic address is if
> they set up an email server in their home *AND* are not sending through an
> authorized relay/mail-forwarder.
>
> ...now, remind me again why I should trust mail coming from a random
> home-user who decided to set up a mailserver from his home? Why should I
> assume that it isn't spam???
>

Thanks. I think that's the crux of it: you're saying that a user needs to be
running their own SMTP server, in the way you mentioned, to run afoul of
PBL? If that's the only way, this doesn't seem like a big deal then. But I
really don't get that sense from the FAQ, which lists different ways to get
caught by this, mainly centered around client authentication settings.
Considering that "all" dynamic IPs are on this list, and surely many people
still use local mail clients and haven't delved into ultra-obscure optional
sections of their mail account properties (you can't even use port 25,
apparently, for "true" authentication, even though that port is still
supported for sending mail from many ISPs), this still seems like a great
way to catch legitimate mail.

The FAQ does make a point to say that PBL "should not affect anyone sending
mail with a normal mail program," because "most people use such a client to
send their mail out through their company or ISP's mail server or webmail
[and] they authenticate their access to those servers with a username and
password." Most? Maybe, maybe not.
http://www.spamhaus.org/faq/answers.lasso?section=Spamhaus%20PBL