Jocko wrote:However, with some Internet searches, I read that some smtp server check the FQDN with the sender's IP. If FQDN doesn't match the IP, the server doesn't send the email. (note it is the case with your provider as it accepts a fake FQDN).
Is it a standard to counter-check FQDN with IP? Because using a DDNS would mean that the FQDN always matches the IP.
Other parts of the email are pointed out. I modified the date generation, and there's no alert anymore about that part.
See:
Header:
- Code: Select all
Content analysis details: (9.3 points, 5.5 required)
pts rule name description ---- ---------------------- -------------------------------------------------- 0.7
DNS_FROM_AHBL_RHSBL RBL: Envelope sender listed in dnsbl.ahbl.org 3.5
BAYES_99 BODY: Bayesian spam probability is 99 to 100% [score: 0.9983] 0.0
MISSING_MID Missing Message-Id: header 1.9
TVD_RCVD_IP TVD_RCVD_IP 0.1
RDNS_DYNAMIC Delivered to trusted network by host with dynamic-looking rDNS 3.1
AWL AWL: From: address is in the auto white-list
- Code: Select all
DNS_FROM_AHBL_RHSBL RBL: Envelope sender listed in dnsbl.ahbl.org 3.5
This seems to be the rising part of the score because of repeated trials. I'll ignore it for this test, but it should be tackled because a very busy, multi-disk NAS may send many different alerts in a short timeframe. Maybe not send an individual alert, but "pool" them in the same email? For example if three or an arbitrary number of alerts are in the pool, or if the alerts have waited for more than
x number hours, then generate an email and send it? That would reduce the likelihood of being marked as a flooder/spammer.
- Code: Select all
MISSING_MID Missing Message-Id: header 1.9
With DDNS hostname;
- Code: Select all
MISSING_MID Missing Message-Id: header 4.3
With public hostname or direct, enclosed IP.
This would be an easy one for developers to solve ;) It seems to rise and fall pretty fast, but its influence is far from negligible. Some common business / institutional email servers are set to discard emails at just 3, and I could understand a user who may want to receive really urgent alerts where he works.
- Code: Select all
RDNS_DYNAMIC Delivered to trusted network by host with dynamic-looking rDNS 3.1
I guess we can't do much about this one, and it also varies widely from one alert to another.
This was done using the DDNS hostname.Not using the DDNS hostname but the
public hostname:
- Code: Select all
HELO_DYNAMIC_HCC Relay HELO'd using suspicious hostname (HCC) 4.4
So very special care should be used when generating the Message-ID and retrieving the hostname. Both of these variables seem to have the most influence on SpamAssassin's behaviour. Other tests with different setups would be required to know which EHLO gives consistently good scores.