cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1952
Views
0
Helpful
4
Replies

How to detect NXDOMAIN for message filters

exMSW4319
Level 3
Level 3

I'm getting a litte annoyed with the following:

ACCEPT sender group SUSPECTLIST match nx.domain SBRS None

Same old story: the sender doesn't have any rDNS and unsurprisingly there's no SBRS either. The message is bot-borne spam.

I'd like to process the mail based on that NXDOMAIN result (or a SERVFAIL) but I can't find the correct variable to test or the value to match it against.

1 Accepted Solution

Accepted Solutions

Hello,

I have reviewed all available options but we're unable to use a message filter to look at the DNS results if nxdomain etc which is seen at the HAT level.

If you would like to action servers based on their DNS verfication results, then you will need to add the sendergroups as per your attached workaround you suggested. I believe this is the only availability so filters can take action based on sendergroup matching.


Regards,

Matthew

View solution in original post

4 Replies 4

Mathew Huynh
Cisco Employee
Cisco Employee

Hey,

Please go to the GUI > Mail Policies > HAT overview > SUSPECTLIST

and Untick the DNS verification Options.

This is to push the email through to your ESA for further processing (if my understanding of your question is correct).

Regards,

Matthew

Yes Matthew, you are correct in guessing that I have the Connecting Host options ticked and if I was confident that I could drop all senders lacking rDNS then it would be a simple matter to clear the settings here and move them to my BLACKLIST group. However, inspection of the No Domain Information line of my Incoming Mail report suggests that this would be unwise.

I'd therefore like to handle this type of mail at either the message filter or content rule level, combining the lack of rDNS with other factors I can identify. I'd previously read article 117977 and also discovered the $HATentry variable in one of the guides, but none of the variables I've found appear to be what I'm after in this particular scenario. I've been testing the values by inserting them into headers.

$group: doesn't appear to work. Filters return "$group" rather than any resolved value. Reading the guides I'm wondering if it would return a matching entry from the sender list added manually to a group, but I haven't tested for that.

$HATentry: only good for SMTP replies, it seems. I get "$HATEntry" from my tests.

$policy: gives the mail flow policy, complete with a dollar sign on the front that might cause problems later. 

$remotehost: returns the host name if resolved through a PTR and $remoteIP if there is none, rather than indicating the NXDOMAIN or SERVFAIL outcomes I'm after.

$remoteIP and $reputation: work consistently

It occurs to me that I can get the result I want by creating a sender group with no associated SBRS purely for dealing with the Connect Host DNS Verification results and then read the corresponding $policy variable, but instinct tells me this would clutter my HAT. I'd prefer to find a variable I can interrogate directly. If it's more efficient to add HAT entries (and Incoming Mail Policies as is advocated in 118551) then I'd best accept that rather than trying to keep these tables compact and neat on top of a long list of content rules and obscure message filters.

I should have mentioned earlier - I'm on Asyncos 8.5.6-074.

Hello,

I have reviewed all available options but we're unable to use a message filter to look at the DNS results if nxdomain etc which is seen at the HAT level.

If you would like to action servers based on their DNS verfication results, then you will need to add the sendergroups as per your attached workaround you suggested. I believe this is the only availability so filters can take action based on sendergroup matching.


Regards,

Matthew

Thanks for confirming, Matthew. I'll see what I can do with that.