Stories
Slash Boxes
Comments
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
 Full
 Abbreviated
 Hidden
More | Login | Reply
Loading... please wait.
  • Disclaimer: I do AV/Anti-spam for ~ 250,000 folk. Many of my e-mail addresses are also plastered all over the 'net, so I get plenty of these bounces too.

    Still, from my perspective, mail must *not* get lost. Failure to deliver a message to it's recipient must *always* generate a bounce message (i.e., an SMTP 5xx error).

    Why? Because I don't trust anti-virus software to always do the right thing. I don't trust anti-spam software to always do the right thing. I don't trust *BLs and local block lists to

    • I fail to see how an automated message saying "A message you didn't send to someone you don't know couldn't be delivered" is useful.

      • I fail to see how an automated message saying "A message you didn't send to someone you don't know couldn't be delivered" is useful.

        It's not. And if you've got an algorithm that can determine when to silently drop mail on the floor with no false positives, I'm all ears. But RFC 2821, s4.2.5 is quite clear on an MTA's responsibilities after it accepts a message. I don't think picking and choosing which bits of an RFC to implement is a good idea.

        Yes, 2821 is in need of an update to deal with today's In

        • If you can detect that the message contains a virus, don't send the virus back. If you can detect which virus the message contains, you can tell whether the virus spoofs e-mail addresses. If it does, don't even send a bounce.

          I gather from the fact that so many of these bounce messages say "Your message tested positive for Sobig" that both points are actually possible — and pratical.

          • If you can detect that the message contains a virus, don't send the virus back.

            Doesn't work if you're trying to save cycles for wanted mail, and rejecting messages based on attachment types, or other content (e.g., the presence of web bugs).

            To be specific, consider three sites, A, B, and C. B has the virus, and is sending mail to C, with forged headers that look like it came from A.

            If C refuses to accept the message (SMTP 5xx), it's B that generates the bounce message to A. The mail logs at B shoul

            • If C accepted the message and silently refused to deilver it then why would B retry? That makes no sense.

              As Schwern pointed out the anti-virus vendors do know which virus is which and they do know which ones spoof sender addresses so of course they shouldn't bounce those ones back to the 'sender'. They should simply say '200 Hmm Yummy' and do nothing more.

              But I have an even simpler rule ... Never generate a bounce response when a virus is detected. Any virus. Ever. By all means have your virus scanning software alert the recipient - as a human being, they can eyeball the sender address and decide whether they want to do anything about it. But the chances that the apparent 'sender' is going to find the bounce message useful is so close to zero that it simply isn't worth sending.

              I've received close on 200MB of unsolicited mail at my personal email address in the last 48hrs. The vast bulk of it (well over 90%) is bounce messages. Even if there was a useful nugget of information in one of those bounce messages, I would never see it since I'm deleting messages 20-30 at a time.

              • Never generate a bounce response when a virus is detected. Any virus.

                As I say -- doesn't work if you're bouncing because of something else in the message (e.g., an attachment type that you don't want to see -- .exe, .pif, etc). This is much simpler to check for than doing a full virus scan, so it runs faster, so it's a better use of resources.

                By all means have your virus scanning software alert the recipient - as a human being, they can eyeball the sender address and decide whether they want to do anyt

                • As I say -- doesn't work if you're bouncing because of something else in the message (e.g., ... .exe, .pif, etc).

                  Nonsense. You are treating messages with those file types as if they contained a virus. So the rule still stands don't bounce it, drop it.

                  If your SMTP server makes a quantitative decision that it can't handle the message (eg: unknown user or out of disk space) then by all means bounce it. On the other hand if your server examines the contents of the message and makes a qualitative decisi

                  • Nonsense. You are treating messages with those file types as if they contained a virus. So the rule still stands don't bounce it, drop it.

                    Not true. It's being treated as 'content not wanted'. There's a large amount of content that's not wanted, and 'has a virus' is just a subset of it. And on a typical day, virus infected content is a tiny fraction of the stuff that gets 5xx'd.

                    If your SMTP server makes a quantitative decision that it can't handle the message (eg: unknown user or out of disk space)

                • This is much simpler to check for than doing a full virus scan, so it runs faster, so it's a better use of resources.

                  Randomly send bounce messages to random e-mail addresses 10% of the time. Don't bother scanning messages. That should keep your system almost as efficient as possible, at the completely ignorable expense of everyone else on the Internet.

                  I don't care if the RFC was handed down on stone tables from Jon Postel. If a bad guy says "Harass innocent people!" and your system does, it's broke

                • As I say -- doesn't work if you're bouncing because of something else in the message (e.g., an attachment type that you don't want to see -- .exe, .pif, etc). This is much simpler to check for than doing a full virus scan, so it runs faster, so it's a better use of resources.

                  A better use of YOUR resources. What about MINE, the poor slob getting flooded?

                  How selfish. You want to employ the world as a giant meat verification system for your overly simplistic virus scanning so you can save a buck!

                  Get

                • Beware of talking cross purposes

                  PS: Railing against AV software that sends helpful notifications back (instead of a 5xx), is a completely different kettle of fish, of course. There's a special level of hell reserved for the authors of Norton AV, which is particularly offensive in this regard.

                  Agree. In the past 24 or so hours, I think I've had 185 "helpful" messages about viruses, versus 21 bounces. So it appears that both sides of this "argument" are right.

                  Personally I'd like

                  • Fuckwits who create AV so
              • As Schwern pointed out
                chromatic and I really are different people. I swear. ;) He says potato, I say potato.