[112408] in North American Network Operators' Group
RE: Yahoo and their mail filters..
daemon@ATHENA.MIT.EDU (Ray Corbin)
Wed Feb 25 16:06:50 2009
From: Ray Corbin <rcorbin@traffiq.com>
To: Brian Keefer <chort@smtps.net>, Micheal Patterson
<micheal@spmedicalgroup.com>
Date: Wed, 25 Feb 2009 15:05:30 -0600
In-Reply-To: <797BD373-3542-4E32-AA24-D22B787F0544@smtps.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
Outbound filtering is a good idea..however after investing lots of money on=
hardware appliances (old company $100,000 on equipment to do just this...)=
you realize you have more issues then solutions. Now you allow forwarded m=
ail, and as you stated most systems accept the messages into the queue proc=
ess the message and then either bounce/quarentine/allow. You can't bounce t=
he message because it goes back to the sender which is almost always spoofe=
d and thus you create backscatter. You cant quarentine because then you may=
flag some of your customers legitimate email.
Isolating your forwarded mail to a separate ip address is really, I think, =
the best way to handel forwarded mail.
-r
-----Original Message-----
From: Brian Keefer [mailto:chort@smtps.net]=20
Sent: Wednesday, February 25, 2009 3:48 PM
To: Micheal Patterson
Cc: nanog@nanog.org
Subject: Re: Yahoo and their mail filters..
On Feb 24, 2009, at 6:27 PM, Micheal Patterson wrote:
> This may be old news, but I've not been in the list for quite some=20
> time. At any rate, is anyone else having issues with Yahoo blocking /=20
> deferring legitimate emails?
>
> My situation is that I host our corporate mx'ers on my network, one of=20
> the companies that we recently purchased has Yahoo hosting their=20
> domains mail. Mail traffic to them is getting temporarily deferred=20
> with the "421 4.7.0 [TS01] Messages from xxx.xxx.xxx.xxx temporarily=20
> deferred due to user complaints - 4.16.55.1; see=20
> http://postmaster.yahoo.com/421-ts01.html"
>
> The admin of the facility has contacted Yahoo about this but their=20
> response was for "more information" when they were told that traffic=20
> from my mx to their domain was to being deferred. I may end up just=20
> having them migrate to my systems just to maintain company=20
> communications if we can't clear this up in a timely manner.
>
> --
> Micheal Patterson
A few comments on this thread in general (speaking only for myself, not in =
any way representing my employer)...
Yes, Yahoo! tend to throttle IPs at the drop of a hat, but those blocks are=
often gone in a few hours as well. Others have pointed out some procedure=
s to follow to minimize the possibility of being =20
blocked. At least they give you a useable SMTP error (usually). =20
Incidentally this is why all my test accounts are on Gmail, because deliver=
y to Yahoo! is often deferred for minutes to hours. Of course, given the r=
ecent Gmail outages I might have to diversify even more...
As for "blackholes" that messages fall into, what is the alternative? =20
You could say reject it in session with a readable error, but that would gi=
ve spammers instant confirmation on whether their campaign is working. Als=
o, the majority of anti-spam products I've seen have to spool the message b=
efore they scan it, so rejecting in session is simply not an option on a lo=
t of commercial platforms.
The other options is to stuff all the spam messages in a folder and expose =
them to the user, taking up a huge amount of storage space for something th=
e vast majority of users are never going to look at any way. Again, a lot =
of commercial solutions have a scoring methodology where you can be pretty =
certain stuff at the top end of the scale is virtually never going to be a =
false positive. The amount of savings in not having to handle and store th=
at crud massively outweighs one or two users missing a newsletter once in a=
while. It can make sense to expose the "mid-range spam" to users and let =
them decide, but why store terabytes of stuff that only a tiny fraction of =
the users may ever care about?
If you're sending important mail that's not reaching the recipient, and you=
have the server logs to prove you handed it off to the destination MTA, op=
en a ticket with them and they'll have logs to track it down.
Regarding taking automatic action based on luser feedback, that is ridiculo=
us in my opinion. From the data I see, the lusers classify mail incorrectl=
y far more than correctly. In fact there's a running joke around here that=
we should simply flip the false-positive and false-negative feeds and enab=
le auto-train, since the only thing you can reliably count on users to do i=
s get things wrong. Submissions from administrators are _far_ more accurat=
e (although even then, not to the point that it always makes sense to take =
automatic action).
Blocking an entire site just because one John Doe user clicked a button the=
y don't even understand just does not make sense.
Last, anywhere that I've seen extensive use of forwards has had a maze =20
of difficult to untangle abuse problems related to forwarded spam. =20
Any site allowing forwarding should apply very robust filtering of outbound=
mail.
--
bk