h-mail server help

 
Post new topic   Reply to topic    Aprelium Forum Index -> Off Topic Discussions
View previous topic :: View next topic  
Author Message
chewzzqq
-


Joined: 28 Sep 2005
Posts: 198

PostPosted: Sat Dec 02, 2006 2:41 pm    Post subject: h-mail server help Reply with quote

check by dnsstuff

Code:

Test Name Result Details TTL Time
PTR  MISSING!  60.53.4.22 has no reverse DNS entry; some mail servers may not accept your mail.  172720 seconds  0 ms

????
my mail server always detect as spam in all yahoo,hotmail,gmail
_________________


Last edited by chewzzqq on Sat Dec 02, 2006 3:01 pm; edited 1 time in total
Back to top View user's profile Send private message Visit poster's website
chewzzqq
-


Joined: 28 Sep 2005
Posts: 198

PostPosted: Sat Dec 02, 2006 3:00 pm    Post subject: Reply with quote

test spam database of aprelium.com


Code:
Test Name Result Details TTL Time
PTR  Pass  PTR= zest.aprelium.com.  85573 seconds  0 ms


how about mind can be missing???
what is this?

Code:
IP address 60.50.4.22 is listed here as 60.50.200.134 misc.spam.

The misc.spam group is mostly (but not entirely) composed of entire addresses blocks that have a) sent spam here, b) have consecutive or missing reverse dns, and c) have no customer sub-delegation via either the controlling RIR (ARIN, RIPE, LACNIC, APNIC, etc) or an rwhois server referenced in the main RIR records.

In particular, 60.50.4.22 has no reverse dns. That needs to be fixed first. Any email sent to the address at the top of this page will be ignored until that is fixed.

In my opinion, the following comment also applies to static ip addresses, where the provider does not actually identify the user of that ip address by domain name.

As Bill Cole points out: "The problem with people on dynamic addresses doing that otherwise perfectly reasonable and normal thing (sending mail directly from their ip address) is not that it violates a service contract (in itself it usually does not) but rather that the dynamic nature of the addresses and the sloppiness/laziness/cheapness of their providers makes it impossible for anyone who gets the mail to have anything useful as an audit trail for where the mail came from beyond identifying an IP address. ISP's historically have claimed that they cannot identify the guilty party and more often today fall back to amorphous and grotesquely unethical 'privacy' standards decreeing that they will not identify abusive users. By racing to the bottom on price and service quality, they have also managed to create an environment where it is impossible for them to remain economically viable and police their networks in any but the most coarse and restrictive ways. We have people shunning port 25 traffic from such networks not because it is inherently bad, but because those networks have no overall competent authority and no way for outsiders to determine a competent authority for any specific address at any particular time."


_________________
Back to top View user's profile Send private message Visit poster's website
chewzzqq
-


Joined: 28 Sep 2005
Posts: 198

PostPosted: Sat Dec 02, 2006 3:29 pm    Post subject: Reply with quote

Code:
If you tried to send email and it was returned to you with an error message that pointed to this page, then the ip address of your outgoing mail server is on our local blocklist composed of the following classes. Use the search form above for more detailed information. For those that are curious, the actual ip address returned from a lookup in this blackholes zone is 127.0.0.X where X is the class number below. For example, bulk mailer ip addresses return 127.0.0.4.

unused

spam - Individual spam sources. These are generally taken from spam samples that have arrived here, and from discussions on news.admin.net-abuse.email. If you have inherited such ip address space, please let me know. However, you are probably on LOTS of other individual blocklists, and will have a hard time getting removed from all of them. A special case is the misc.spam group, which includes entire blocks of addresses that have a) sent spam here, b) have consecutive or missing reverse dns, and c) have no customer sub-delegation via either the controlling RIR (ARIN, RIPE, LACNIC, APNIC, etc) or an rwhois server referenced in the main RIR records.

dialup - Dialup equivalent ip addresses. This was an attempt at tracking dialup equivalent address space, but it was too labor intensive, and has been discontinued. The DCC is as effective at blocking dialup spam with a lower false positive rate.

bulk - Bulk mailers that don't require closed loop confirmed opt-in from their customers, or that have have allowed known spammers to become clients.

"closed loop confirmed opt-in" is where you have some mechanism to signup for your mailing lists, possibly a web form with a "sign me up for mailings" entry, and someone puts in an email address. Your system then generates a random token, emails a single message to that address saying something like "someone, possibly not you, signed up for mailing list xxx at date/time/ip address. If that was really you, return this token yyy by (clicking on this link, reply to this message, possibly other mechanism)". After your system receives the confirmation including that random token, you can now have reasonable confidence that the actual owner of that email address does want to receive messages from you. You need to keep the details (date/time/ip address of the original signup, the random token that was used, the method of returning that token and any associated information (email headers in the case of an email response, date/time/ip from the web server logs in the case of an http click return method, etc) of that signup to protect yourself from future charges of spamming.

In the case that you use some embedded http link as the method to return the random token, you need to include at least two links in the message. One to confirm the message, and a second (probably less visible) link to trap automated systems that simulate clicks on every link in an email message. There are cases where your original confirmation message will go to folks that did NOT signup, and some of those addresses will be automated spam traps that eventually cause the message to be posted to news.admin.net-abuse.sightings, and there are bots that scan nanas and click on every link in every message posted there.

multistage - The output server from multi-stage open relay chains that have sent spam to users here.

singlestage - Single stage open relays that are not listed on ORDB yet.

spam-support - Networks that provide services to spammers, including connectivity, dns, email, sales, or any other service. This includes any business that provides email addresses to third parties, where those third parties then send email to those addresses, otherwise known as email appending services. In this case, you will need to find another provider, or you will need to convince your current provider to remove their support for spammers.

webform - Web servers running vulnerable versions of formmail.pl or other abusable web-to-mail gateways. This may also include machines acting as smarthosts for such web servers.

misc - Miscellaneous includes (but is NOT limited to) systems that are strongly suspected of being multistage open relays (where I have not been able to identify the input stage) or open proxies. It also includes any system that delivers spam here, that appears to be running MS SMTPSVC, and that appears to have relayed the message from China, Korea, Brazil, or any known open proxy. These are generally systems that have enabled the guest account, and spammers are using them as open relays, even though they do require SMTP AUTH. Enabling the guest account allows anyone to relay thru them. Note that this does NOT include misc.spam which is listed under spam above.

klez - Systems that send virus notifications (klez, sobig, etc) to the supposed sender. Most modern virii forge the return address, so these automated notifications are worthless and are treated here as spam.

tcpa - Systems that are owned by organizations that blatently violate the TCPA by leaving pre-recorded sales calls here, or by failing to maintain a do-not-call list. For example, the San Bernardino Sun was the original inspiration for this section. The details are here.

free - Free mail providers.

cr - Systems that have delivered challenge-response spam here.

_________________
Back to top View user's profile Send private message Visit poster's website
aprelium
-


Joined: 22 Mar 2002
Posts: 6800

PostPosted: Sat Dec 02, 2006 3:31 pm    Post subject: Re: h-mail server help Reply with quote

chewzzqq,

You should probably set a reverse DNS entry in your DNS records (check that with your DNS server host/domain name registrar).
_________________
Support Team
Aprelium - http://www.aprelium.com
Back to top View user's profile Send private message Send e-mail
chewzzqq
-


Joined: 28 Sep 2005
Posts: 198

PostPosted: Sat Dec 02, 2006 3:41 pm    Post subject: Reply with quote

no understand
_________________
Back to top View user's profile Send private message Visit poster's website
Display posts from previous:   
Post new topic   Reply to topic    Aprelium Forum Index -> Off Topic Discussions All times are GMT + 1 Hour
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB phpBB Group