HELO/EHLO Pattern Matching

From ASRG
Revision as of 08:43, 15 March 2008 by Randy (talk | contribs) (New page: {{ast |date= |difficult=Low |popular=Low |effective=High |harm=Low to Medium |where=MTA }} SMTP requires the client to send either its fully-qualified domain name or its IP address in squa...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search
Anti-spam technique: HELO/EHLO Pattern Matching
Date of first use:
Effectiveness: High
Popularity: Low
Difficulty of implementation: Low
Where implemented: MTA
Harm: Low to Medium

SMTP requires the client to send either its fully-qualified domain name or its IP address in square brackets as its EHLO/HELO name. Some spambots use fixed strings, and some use dynamic strings that in some cases uses the actual domain name or the IP address of its computer. Since spambots are often running on compromised home systems, the resulting EHLO/HELO names may contain "localhost", IP addresses, "ADSL", "dynamic", etc. Some servers attempt to pattern match, looking for strings with a high likelihood of being a compromised home user and a low risk of being a legitimate organization. The risk is that many organizations have improperly configured mail servers and as a result send poorly-chosen EHLO names. Smaller organizations especially might be using DSL lines and not have good PTR records. Such techniques therefore require careful monitoring to detect when legitimate organizations are blocked.