Dynamic reverse dns rule problem

This is the area for a general support questions, discussions and information that you can read and share. Post your experiences, stats and tricks and tips that are not covered elsewhere. Remember, for questions please search the FAQ first, as your question may already be answered.

Moderators: wizard, magicspam

Post Reply
diadem.support
Posts: 21
Joined: Thu Nov 05, 2009 1:27 am

Dynamic reverse dns rule problem

Post by diadem.support » Thu Nov 05, 2009 1:38 am

Hello,

We have recently installed magic spam but various clients are complaining that there mails are not getting thorough to our server.While checking the log we found something like:

2009-11-04 18:27:44 magicspam-plesk[12400]: SPAM[check_dynamic_reverse_dns]: mua=0,ip=[122.182.6.129:dsl-mum-static-ilp-129.6.182.122.airtelbroadband.in],helo=<mail2.ambitpte.com>,from=<VishalRandive@ambitcapital.com>,rcpt=<vikram@tcg-advisory.com>

Here it is blocked by the rule check_dynamic_reverse_dns, but the client is using a static IP provided by their ISP Airtel to run their mail server. Can you explain why this is happening?

Regards,
Diadem Technologies Pvt. Ltd.

magicspam
Posts: 1563
Joined: Tue Oct 28, 2008 2:27 pm

Re: Dynamic reverse dns rule problem

Post by magicspam » Thu Nov 05, 2009 9:45 am

Hello,

The rule 'check_dynamic_reverse_dns' is based on ensuring that an email server operator follow the best practices methodology of proper DNS naming conventions.

While the IP address itself is static, it is still set to a 'dynamic' style naming convention, commonly associated with various IP pools as provided by an internet service provider and as such has not been set in association with any identity specific to the email server and/or domain itself. For the example listed, we would expect that 122.182.6.129 would have a reverse DNS entry configured similar to the HELO:

mail2.abitpte.com

Those emails that were blocked should have received an extended 550 rejection notice pointing them to this page:

http://www.linuxmagic.com/best_practice ... e_dns.html

which covers in full detail what the nature of the policy is along with the origins.

You do of course have a couple of options available. You, as the recipient email service, can opt to take the high road and enforce the policy - pointing out to those operators affected that as part of best practices they *should* be contacting their ISP to have the reverse DNS for said IP addresses set properly (this is normally a free service from most ISPs).

You also have the following options available:

* Disable the rule check_dynamic_reverse_dns (NOT recommended. This particular rule is responsible for catching an extremely large portion of infected home PC spam)
* Adding a white list entry for either those server IP's that you know can be trusted, or adding white list entries for 'from' email addresses / domains.
* Adding a 'fake' DNS entry in the /etc/hosts file on your server.

We hope this information helps.
-- MagicSpam Support Team --

Post Reply

Return to “General Discussions and Support Questions”

Who is online

Users browsing this forum: No registered users and 2 guests