View previous topic :: View next topic |
Author |
Message |
chewzzqq -
Joined: 28 Sep 2005 Posts: 198
|
Posted: Sat Dec 02, 2006 2:41 pm Post subject: h-mail server help |
|
|
check by dnsstuff
Code: |
Test Name Result Details TTL Time
PTR MISSING! 60.53.4.22 has no reverse DNS entry; some mail servers may not accept your mail. 172720 seconds 0 ms
|
????
my mail server always detect as spam in all yahoo,hotmail,gmail _________________
Last edited by chewzzqq on Sat Dec 02, 2006 3:01 pm; edited 1 time in total |
|
Back to top |
|
|
chewzzqq -
Joined: 28 Sep 2005 Posts: 198
|
Posted: Sat Dec 02, 2006 3:00 pm Post subject: |
|
|
test spam database of aprelium.com
Code: | Test Name Result Details TTL Time
PTR Pass PTR= zest.aprelium.com. 85573 seconds 0 ms
|
how about mind can be missing???
what is this?
Code: | IP address 60.50.4.22 is listed here as 60.50.200.134 misc.spam.
The misc.spam group is mostly (but not entirely) composed of entire addresses blocks that have a) sent spam here, b) have consecutive or missing reverse dns, and c) have no customer sub-delegation via either the controlling RIR (ARIN, RIPE, LACNIC, APNIC, etc) or an rwhois server referenced in the main RIR records.
In particular, 60.50.4.22 has no reverse dns. That needs to be fixed first. Any email sent to the address at the top of this page will be ignored until that is fixed.
In my opinion, the following comment also applies to static ip addresses, where the provider does not actually identify the user of that ip address by domain name.
As Bill Cole points out: "The problem with people on dynamic addresses doing that otherwise perfectly reasonable and normal thing (sending mail directly from their ip address) is not that it violates a service contract (in itself it usually does not) but rather that the dynamic nature of the addresses and the sloppiness/laziness/cheapness of their providers makes it impossible for anyone who gets the mail to have anything useful as an audit trail for where the mail came from beyond identifying an IP address. ISP's historically have claimed that they cannot identify the guilty party and more often today fall back to amorphous and grotesquely unethical 'privacy' standards decreeing that they will not identify abusive users. By racing to the bottom on price and service quality, they have also managed to create an environment where it is impossible for them to remain economically viable and police their networks in any but the most coarse and restrictive ways. We have people shunning port 25 traffic from such networks not because it is inherently bad, but because those networks have no overall competent authority and no way for outsiders to determine a competent authority for any specific address at any particular time."
|
_________________
|
|
Back to top |
|
|
chewzzqq -
Joined: 28 Sep 2005 Posts: 198
|
Posted: Sat Dec 02, 2006 3:29 pm Post subject: |
|
|
Code: | If you tried to send email and it was returned to you with an error message that pointed to this page, then the ip address of your outgoing mail server is on our local blocklist composed of the following classes. Use the search form above for more detailed information. For those that are curious, the actual ip address returned from a lookup in this blackholes zone is 127.0.0.X where X is the class number below. For example, bulk mailer ip addresses return 127.0.0.4.
unused
spam - Individual spam sources. These are generally taken from spam samples that have arrived here, and from discussions on news.admin.net-abuse.email. If you have inherited such ip address space, please let me know. However, you are probably on LOTS of other individual blocklists, and will have a hard time getting removed from all of them. A special case is the misc.spam group, which includes entire blocks of addresses that have a) sent spam here, b) have consecutive or missing reverse dns, and c) have no customer sub-delegation via either the controlling RIR (ARIN, RIPE, LACNIC, APNIC, etc) or an rwhois server referenced in the main RIR records.
dialup - Dialup equivalent ip addresses. This was an attempt at tracking dialup equivalent address space, but it was too labor intensive, and has been discontinued. The DCC is as effective at blocking dialup spam with a lower false positive rate.
bulk - Bulk mailers that don't require closed loop confirmed opt-in from their customers, or that have have allowed known spammers to become clients.
"closed loop confirmed opt-in" is where you have some mechanism to signup for your mailing lists, possibly a web form with a "sign me up for mailings" entry, and someone puts in an email address. Your system then generates a random token, emails a single message to that address saying something like "someone, possibly not you, signed up for mailing list xxx at date/time/ip address. If that was really you, return this token yyy by (clicking on this link, reply to this message, possibly other mechanism)". After your system receives the confirmation including that random token, you can now have reasonable confidence that the actual owner of that email address does want to receive messages from you. You need to keep the details (date/time/ip address of the original signup, the random token that was used, the method of returning that token and any associated information (email headers in the case of an email response, date/time/ip from the web server logs in the case of an http click return method, etc) of that signup to protect yourself from future charges of spamming.
In the case that you use some embedded http link as the method to return the random token, you need to include at least two links in the message. One to confirm the message, and a second (probably less visible) link to trap automated systems that simulate clicks on every link in an email message. There are cases where your original confirmation message will go to folks that did NOT signup, and some of those addresses will be automated spam traps that eventually cause the message to be posted to news.admin.net-abuse.sightings, and there are bots that scan nanas and click on every link in every message posted there.
multistage - The output server from multi-stage open relay chains that have sent spam to users here.
singlestage - Single stage open relays that are not listed on ORDB yet.
spam-support - Networks that provide services to spammers, including connectivity, dns, email, sales, or any other service. This includes any business that provides email addresses to third parties, where those third parties then send email to those addresses, otherwise known as email appending services. In this case, you will need to find another provider, or you will need to convince your current provider to remove their support for spammers.
webform - Web servers running vulnerable versions of formmail.pl or other abusable web-to-mail gateways. This may also include machines acting as smarthosts for such web servers.
misc - Miscellaneous includes (but is NOT limited to) systems that are strongly suspected of being multistage open relays (where I have not been able to identify the input stage) or open proxies. It also includes any system that delivers spam here, that appears to be running MS SMTPSVC, and that appears to have relayed the message from China, Korea, Brazil, or any known open proxy. These are generally systems that have enabled the guest account, and spammers are using them as open relays, even though they do require SMTP AUTH. Enabling the guest account allows anyone to relay thru them. Note that this does NOT include misc.spam which is listed under spam above.
klez - Systems that send virus notifications (klez, sobig, etc) to the supposed sender. Most modern virii forge the return address, so these automated notifications are worthless and are treated here as spam.
tcpa - Systems that are owned by organizations that blatently violate the TCPA by leaving pre-recorded sales calls here, or by failing to maintain a do-not-call list. For example, the San Bernardino Sun was the original inspiration for this section. The details are here.
free - Free mail providers.
cr - Systems that have delivered challenge-response spam here.
|
_________________
|
|
Back to top |
|
|
aprelium -
Joined: 22 Mar 2002 Posts: 6800
|
Posted: Sat Dec 02, 2006 3:31 pm Post subject: Re: h-mail server help |
|
|
chewzzqq,
You should probably set a reverse DNS entry in your DNS records (check that with your DNS server host/domain name registrar). _________________ Support Team
Aprelium - http://www.aprelium.com |
|
Back to top |
|
|
chewzzqq -
Joined: 28 Sep 2005 Posts: 198
|
Posted: Sat Dec 02, 2006 3:41 pm Post subject: |
|
|
no understand _________________
|
|
Back to top |
|
|
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|