LWN: Comments on "Backscatter increase clogs inboxes" https://lwn.net/Articles/277304/ This is a special feed containing comments posted to the individual LWN article titled "Backscatter increase clogs inboxes". en-us Wed, 17 Sep 2025 12:45:10 +0000 Wed, 17 Sep 2025 12:45:10 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net backscatterer blacklist at ips.backscatterer.org https://lwn.net/Articles/278682/ https://lwn.net/Articles/278682/ endecotp <div class="FormattedComment"><pre> I use the RBL-style DNS list of backscatter-generating mail servers at ips.backscatterer.org. When I get a message that looks like a bounce (i.e. its envelope has an empty sender), if the sender is listed at ips.backscatterer.org then I reject the message. The disadvantage of this is that genuine bounces from listed domains will be lost. But not other email from them. The backscatterer.org list doesn't seem to be very comprehensive; I'm not sure where the data comes from. I still get significant bursts of backscatter and I haven't measured how many messages are rejected by this rule during those bursts. Also, some backscatter doesn't have the empty sender that a normal bounce does - for example, vacation messages. So these still get through. Here's the exim.conf fragment that I use; it lives in the acl_check_data section: deny senders = : dnslists = ips.backscatterer.org message = This message looks like a bounce, and your server is listed at \ ips.backscatterer.org, so I assume that this is "backscatter". \ Please configure your mail server to not send "backscatter spam". \ For advice, try <a rel="nofollow" href="http://www.dontbouncespam.org/">http://www.dontbouncespam.org/</a> </pre></div> Fri, 18 Apr 2008 23:09:28 +0000 If SPF is too complex try CSV/CSA https://lwn.net/Articles/278337/ https://lwn.net/Articles/278337/ copsewood <div class="FormattedComment"><pre> Good article thanks. I think that SPF is probably redundant, because if you want to know the sending MTA is responsibly managed CSV/CSA together with a domain reputation system is probably better. If you want to know the message is authentic, Domainkeys offers a better solution. I don't think there is much overlap in function between Domainkeys and CSV/CSA but SPF tries to overlap both and does neither job well. </pre></div> Thu, 17 Apr 2008 11:07:54 +0000 SPF etc https://lwn.net/Articles/278321/ https://lwn.net/Articles/278321/ cras <div class="FormattedComment"><pre> Submission port (587, RFC 2476) helps with your first problem. It's not usually blocked by firewalls. I wish it would get better support from clients though. </pre></div> Thu, 17 Apr 2008 09:11:17 +0000 SPF etc https://lwn.net/Articles/278298/ https://lwn.net/Articles/278298/ odie <div class="FormattedComment"><pre> I run into two problems with SPF (haven't looked at DKIM). First, I often send mail from my laptop, connected to the internet with various means. Many networks have firewalls blocking outgoing connections to port 25, meaning I have to relay my mail via their SMTP gateway instead of my own. I suppose I could tunnel all my outgoing mail to my SMTP server via ssh or some such, but I have several less technical users of my domain who also are heavy laptop users, or use my domains for personal mails when at work etc. Secondly, I run a bunch of mailing lists. This means a lot of mail from various senders is relayed by my server. The official solution to this is to rewrite the sender in the mail headers, which seems like a terrible kludge. A mechanism whereby I could insert a server signature in the headers indicating that I have OK'd the sender would be a better solution. SPF just doesn't fit in with how SMTP works. </pre></div> Thu, 17 Apr 2008 07:26:39 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277701/ https://lwn.net/Articles/277701/ gvegidy <p>A colleague wrote <a href="https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5555">this extension</a> to the SpamAssassin-VBounce-plugin. If you sign all your mail with DKIM it makes sure that the bounce contains valid DKIM-headers of the original mail. The only problem we experienced is that a few servers don't include any headers of the original mail in the bounce :-(</p> <p>The patch did not get accepted yet because the CLA-process is not completed/carried on into the sa-bugtracker</p> Sun, 13 Apr 2008 20:17:35 +0000 If SPF is too complex try CSV/CSA https://lwn.net/Articles/277676/ https://lwn.net/Articles/277676/ kevinbsmith <div class="FormattedComment"><pre> For those of you who don't naturally think in RFC-speak, here is a gentler introduction to CSA: <a href="http://www-uxsup.csx.cam.ac.uk/~fanf2/hermes/doc/antiforgery/csa.html">http://www-uxsup.csx.cam.ac.uk/~fanf2/hermes/doc/antiforg...</a> It's still not quite as "plain English" as I would prefer, but it's not bad. I would be interested to hear other opinions about a) how much good for individuals who adopt it tomorrow, b) the likelihood of it being widely adopted, and c) how much good it could do if widely adopted. I'm still sad about SPF. The worst part was when I set up both email hosting and outgoing smtp services at pobox.com (who themselves were among the SPF originators), and was still unable to find or get a simple recipe for configuring SPF. </pre></div> Sat, 12 Apr 2008 19:46:59 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277646/ https://lwn.net/Articles/277646/ Xman I myself have had a <a href="http://xblog.xman.org/articles/2008/03/31/blowback-from-the-war-on-spam">most unfortunate encounter with backscatter</a>, and I tried adding SPF with no measurable effect. I'm going to try adding DKIM soon to see if it helps, but I'm not anticipating much in the way of good news. Sat, 12 Apr 2008 05:17:56 +0000 what is SPF good for ? https://lwn.net/Articles/277575/ https://lwn.net/Articles/277575/ giraffedata "As for punishing people with bad setups. Yes!" <p> If only there were some way to do that without punishing the sender and recipient of the mail more. <p> I have often seen instances of mail recipients rejecting my mail out of spite, based on an opinion of how the mail system should work. In every instance, the recipient would have enjoyed receiving my mail more than I would have enjoyed him receiving it. In most cases, it was a reply to an email he sent me. Fri, 11 Apr 2008 15:53:54 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277567/ https://lwn.net/Articles/277567/ giraffedata I use a similar technique in my personal spam filter. All mail I send has my name in the "from:" RFC822 header. When I receive a bounce message, I look at the from: header of the bounced message and if it doesn't have my name, I know it's a bounce of something I didn't send. (Actually, I think I just do a string search of the entire bounce message for my name). <p> But I note that in the past two days, only 1 of the 900 spams addressed to my userid was a backscatter bounce. I know it used to be more. Fri, 11 Apr 2008 15:41:58 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277548/ https://lwn.net/Articles/277548/ dwmw2 <BLOCKQUOTE><I>Interesting idea. Do you have a link to the software you use for that, and configuration details? What drawbacks have you run into with this technique?</I></BLOCKQUOTE> It was originally done in response to the <A HREF="http://david.woodhou.se/why-not-spf.html">brain-damage of SPF</A> &mdash; an implementation of the 'Sender Rewriting Scheme' which the SPF nutters thought every existing forwarding host would end up implementing to conform to their retroactive redefinition of SMTP.<P> The idea was that in the Brave New World you weren't allowed to simply forward mail intact as we've been doing for decades. That's now called "forgery". So when forwarding a mail to a broken server which checks SPF, you have to mangle the source address to appear to be from one of your <em>own</em> domains instead. So you might rewrite it something like: <BLOCKQUOTE><TT><I>&lt;originaldomain&gt;</I>+<I>&lt;originaluser&gt;</I>@example.org</TT></BLOCKQUOTE> But that obviously isn't safe, because you want people to be able to receive bounces through this path &mdash; you have to relay those bounces on to the original user. If you were to just accept any old <TT><I>domain</I>+<I>user</I>@example.org</TT> and forward that to <TT><I>user</I>@<I>domain</I></TT> then you'd effectively be an open relay.<P> So the scheme has to provide some kind of authentication on these made-up addresses, which we do with a crypto hash of the address with some local secret. Also we want to time-limit these signed addresses to prevent them being harvested and used for ever more. And add a prefix so we disambiguate from normal user addresses easily. We end up with something more like: <BLOCKQUOTE><TT>SRS0+<I>&lt;hash&gt;</I>+<I>&lt;timestamp&gt;</I>+<I>&lt;domain&gt;</I>+<I>&lt;user&gt;</I>@example.org</TT></BLOCKQUOTE> I implemented this and set it up so that it triggers only when forwarding mail from a domain with an SPF record, to a known SPF-afflicted recipient. Although it was mostly pointless because before adding such recipient domains to the list, I'd contact their postmaster and explain to them how broken SPF was and how it was causing them to reject valid mail &mdash; and they'd usually just stop rejecting for SPF failures. My '<TT>spf-afflicted-domains</TT>' list has remained fairly much empty<P> But then I realised that the rewriting scheme itself could achieve most of what SPF set out to do, without the brokenness. I just set it to rewrite my <em>own</em> outgoing mail. So instead of sending <TT>MAIL FROM:&lt;dwmw2@infradead.org&gt;</TT>, it's rewritten to something like <TT>&lt;SRS0+d6ac8e5b21d8f29d40b9+1675+infradead.org+dwmw2@pentafluge.srs.infradead.org&gt;</TT> &mdash; which is only in the SMTP transactions and the <TT>Return-Path:</TT> header of the mail; it's not visible in the <TT>From:</TT> header so most people never even notice.<P> I accept bounces (<TT>MAIL FROM:&lt;&gt;</TT>) <em>only</em> to the signed addresses, and &mdash; this is the important part &mdash; don't accept bounces to the normal address.<P> <P> This has the knock-on effect that other people don't need to accept faked mail from the normal address either. Here's an attempt to feed fake mail from <TT>dwmw2@infradead.org</tt> to sourceforge, for example: <BLOCKQUOTE><PRE> 220 mail.sourceforge.net ESMTP Exim 4.44 Fri, 11 Apr 2008 02:40:10 -0700 sc8-sf-mx1.sourceforge.net HELO pmac.infradead.org 250 mail.sourceforge.net Hello pmac.infradead.org [90.155.92.200] MAIL FROM:&lt;dwmw2@infradead.org&gt; 250 OK RCPT TO:&lt;bluez-devel@lists.sourceforge.net&gt; 550-Verification failed for &lt;dwmw2@infradead.org&gt; 550-Called: 213.146.154.40 550-Sent: RCPT TO:&lt;dwmw2@infradead.org&gt; 550-Response: 550-This address never sends messages directly, and should not accept bounces. 550-550-Please see http://www.infradead.org/rpr.html or contact 550-550 postmaster@infradead.org for further information. 550 Sender verify failed QUIT 221 mail.sourceforge.net closing connection </PRE></BLOCKQUOTE> <P> It's done in Exim, which is versatile enough to do it all for itself without needing external software. My original write-up is at <A HREF="http://www.infradead.org/rpr.html">http://www.infradead.org/rpr.html</A>. It's slightly out of date now &mdash; one of the things I've changed since then is to remove the full timestamp from the domain part, since it interacted badly with greylisting (as it's regenerated each time). The setup I'm <em>actually</em> using currently is <A HREF="http://david.woodhou.se/eximconf/include/routers-ses">here</A>. <P> There are a couple of caveats that I've noticed, but nothing particularly problematic (for me, at least). The first is that it can interact badly with broken vacation messages or other autoresponses. If an autoresponse message is sent as a bounce, but to the <TT>From:</TT> address instead of to the SMTP reverse-path, then it obviously gets rejected. Some consider that a feature, though &mdash; and in fact most of the broken autoresponders out there are doubly-broken: not only are they sent to the <TT>From:</TT> address, but they're also <em>not</em> sent as a bounce. Which means they get through just fine, which is unfortunate when they are responding to faked mail, but thankfully there aren't so many of them that it negates the benefit overall.<P> The other problem I've seen was a mailing list which allows only senders to post, and does so by checking the SMTP reverse-path. Almost all mailing lists check the <TT>From:</TT> address, which works fine. I've encountered precisely <em>one</em> list which does it on the reverse-path, and ironically that was the one which was set up to discuss the whole 'Signed Envelope Sender' scheme. It's easy enough to work around &mdash; you just keep a list of such recipients and have your system use a special, fixed 'time' value when sending mail to those recipients. I never got round to implementing that; I just used a different address for that list, and have never seen the problem again. Fri, 11 Apr 2008 11:20:43 +0000 If SPF is too complex try CSV/CSA https://lwn.net/Articles/277458/ https://lwn.net/Articles/277458/ copsewood I think there are 2 reasons SPF hasn't delivered much help in practice. <p> <ol> <li>Not much use other than to help with whitelisting known good domains. It pushes the problem back from knowing what the good and bad IP addresses are to knowing what the good and bad domains are, but only helps here for known good domains with SPF records consistent with email envelopes. </li> <li>It tries to go too far and ends up too complex and difficult to maintain. (I've implemented SPF and believe me, it's a mess). If there is any regular change in where your domain email users want to send their mail from, maintaining a useful SPF DNS record becomes unlikely.</li> </ol> </p> Knowing which domain is responsible for a sending MTA is likely to be easier than knowing which addresses an envelope From: (not the header From) can reasonably be sent from. The Microsoft take on SPF, SenderID is even worse because it tries to validate the header From and related headers. <p> If it is more easy to know good from bad domains than good from bad addresses, <a href="http://mipassoc.org/csv/draft-ietf-marid-csv-csa-02.html"> CSV-CSA </a> provides a much simpler check of the domain responsible for the sending MTA and doesn't care about any envelope or body headers beyond the HELO/EHLO greeting. Presumably if the MTA is run from a well managed and reputable domain, the rest of the message is more likely to be authentic. For those particularly interested in message authenticity (useful if you want to know a message claiming to be from your bank is actually from your bank) then DomainKeys can be used to give stronger assurances. However, DomainKeys isn't reliable for mail going through mailing lists or other gateways that mangle the body or headers of the message. </p> Thu, 10 Apr 2008 18:03:02 +0000 what is SPF good for ? https://lwn.net/Articles/277454/ https://lwn.net/Articles/277454/ zlynx <div class="FormattedComment"><pre> That's another good use of it. I don't whitelist at the mail server level so I didn't think of it. As for punishing people with bad setups. Yes! Admins are already punished for running open relays, not having reverse DNS records, firewall blocking their sending SMTP servers and many other things. If they publish a SPF record, it had better be correct. </pre></div> Thu, 10 Apr 2008 17:10:16 +0000 what is SPF good for ? https://lwn.net/Articles/277453/ https://lwn.net/Articles/277453/ copsewood <div class="FormattedComment"><pre> Personally, having implemented it and then given up, I think the only useful application for SPF is whitelisting. If you score based on SPF pass or fail and this increases your false positives/negatives there is no point using it in this way, unless your objective is to punish people for incorrect or unmaintained SPF setups. However, if you have whitelisted the domain as having a well-managed mail system then SPF can give you some confidence a message from a particular IP address is from that domain. </pre></div> Thu, 10 Apr 2008 16:50:04 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277450/ https://lwn.net/Articles/277450/ jake <div class="FormattedComment"><pre> <font class="QuotedText">&gt; Interesting idea. Do you have a link to the software you use for that,</font> <font class="QuotedText">&gt; and configuration details? What drawbacks have you run into with this technique?</font> I probably should have referred to it in the article, but we had some information about Bounce Address Verification in <a rel="nofollow" href="http://lwn.net/Articles/189531/">http://lwn.net/Articles/189531/</a> I think that is what David is referring to or is something similar. The info in that article may be getting out of date now, though. jake </pre></div> Thu, 10 Apr 2008 16:34:10 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277449/ https://lwn.net/Articles/277449/ eli <div class="FormattedComment"><pre> Interesting idea. Do you have a link to the software you use for that, and configuration details? What drawbacks have you run into with this technique? </pre></div> Thu, 10 Apr 2008 16:22:05 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277399/ https://lwn.net/Articles/277399/ dwmw2 It's not particularly difficult to avoid backscatter. I never send <TT>MAIL FROM:&lt;dwmw2@infradead.org&gt;</TT>, and thus I never need to accept bounces to that address. <P> Instead of using my raw email address as the SMTP reverse-path of outgoing mail, my mailservers automatically rewrite it to include a timestamp (and an md5 hash to make it non-trivial to fake). Then they can recognise and accept only <em>valid</em> bounces to mail which I did actually send, while rejecting the backscatter from fakes. <P> As an added bonus, when I started doing this, people whose mailservers bother with <A HREF="http://exim.org/exim-html-current/doc/html/spec_html/ch40.html#SECTcallver">sender verification callouts</A> were also able to reject the mail faked to appear from <TT>dwmw2@infradead.org</TT> too. Thu, 10 Apr 2008 13:37:07 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277360/ https://lwn.net/Articles/277360/ dcovey <div class="FormattedComment"><pre> SPF and DKIM have been in development for years. Both assume that an email provider will supply a secure, authenticated relay and clients will select the correct relay based on their 'from' domain. This hasn't happened on a large scale yet, from what I've seen. </pre></div> Thu, 10 Apr 2008 06:45:59 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277352/ https://lwn.net/Articles/277352/ zlynx <div class="FormattedComment"><pre> In the early days of SPF some sites were configured to give bonus points or whitelist source domains with SPF. The right way to use SPF is negative scoring only. If email doesn't match its domain SPF then give it spam points ... whatever you happen to think it's worth. </pre></div> Thu, 10 Apr 2008 04:49:09 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277350/ https://lwn.net/Articles/277350/ dlang <div class="FormattedComment"><pre> I thought I read that the most extensive use of SPF was spammers domains. on the other hand if you do have a SPF definition and the mail server does check it when it receives the mail, it won't send it on to the second-level process that's eventually bouncing the message. </pre></div> Thu, 10 Apr 2008 04:40:04 +0000 Backscatter increase clogs inboxes https://lwn.net/Articles/277342/ https://lwn.net/Articles/277342/ motk <div class="FormattedComment"><pre> qmail is especially bad at this, and there are so many dodgy qmail setups out there ... </pre></div> Thu, 10 Apr 2008 01:59:14 +0000