TrustedSource listed IP as high-risk for only one member/site of a 2-node stretched DAG

2 NODE Stretched DAG
Each site obviously has its own HT/CAS
I fail-over to Site B and after about a week or so the External IP goes from "minimal risk" to "high risk" at http://trustedsource.org/ 
I of course modify the "Source Server" to that it is in the same site as the active node.
I have ptr records for each external IP that shows up in the header (regardless of which site is active)
If I fail-back to Site A everything is fine.
I do believe I have the SPF properly set and only show up as a risk on http://trustedsource.org/.  
I have checked the IP against multiple online checks - only McAfee's trustedsource has us listed.
When we contact them all they can say is that the IP is associated with a known spammer.  No other details.
Yet,, when we fail-back to site A that IP never gets listed - no matter how long we use that site.

What is going on?

Thank you for your time in advance!

-KB
LVL 8
K BAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

David Johnson, CD, MVPOwnerCommented:
Perhaps SITE B had hosted a spammer in the past, see if you can get another ip address for site B
0
K BAuthor Commented:
Thank you for your reply.

It's a block of listed "low risk" IPs (for SITE B) I have at my disposal. They haven't been utilized in over 5 years.  

I did swap out the IP for another fresh "low risk" IP. Once again, one week later it was listed as "high risk".

The original IP I used on SITE B is now down to "Low Risk" yet again.  It must be something we are doing with the IP as opposed to what others may have done with them in the past.  The confusion is around the fact that we are doing the very same thing that we do in SITEA that we do in SITEB.

I just requested the client provide a full list of all servers that are using Exchange as a relay.  I wonder if they are using the IP of the passive sites HT/CAS & if that would cause an issue.  Not sure how it would though. The SPF and PTR records are in place.

Any help would be greatly appreciated.

-KB
0
Simon Butler (Sembee)ConsultantCommented:
If the address hasn't been used, then suddenly starts sending out email, then that would raise a flag. It has no reputation to build on, so the risk assessment algorithms don't know if it is legitimate or not. Once the reputation starts to build up then it will become less of a risk.

Simon.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
The Ultimate Tool Kit for Technolgy Solution Provi

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy for valuable how-to assets including sample agreements, checklists, flowcharts, and more!

K BAuthor Commented:
Simon,
Thanks for your reply.
The problem seems to be that mail does not reach their intended recipients during this time of "high risk".  How do we move past that?
-KB
0
Simon Butler (Sembee)ConsultantCommented:
No idea. I don't use McAfee's services.

I check my own IP address and that is flagged as high risk as well, and I have no problems sending email to my clients. I checked a few other clients and those are fine as well.

Are you sure that it is the McAfee service that is being used to block the messages?

Simon.
0
K BAuthor Commented:
Yes and the recipients are companies like ATT.com
Not all domains are affected but ATT.com is huge for this client.
0
Simon Butler (Sembee)ConsultantCommented:
Not being in the USA, AT&T is not a company I have anything to do with.
The last I heard they used their own blacklists (as most major email providers do).
http://rbl.att.net/block_inquiry.html

If you are getting blocked by the provider they should tell you why.

The only suggestion in this scenarios is to route email out through another service or server that is trusted. You have no way of knowing why the address is listed as high risk, as the providers are not going to say.

Simon.
0
K BAuthor Commented:
Simon,

That AT&T link is terrific - Thank you!

So on the same page that you see your rating (for example: http://www.mcafee.com/threat-intelligence/ip/default.aspx?ip=8.8.8.8) you can click the "threat feedback" link - it looks like a breadcrumb link - and you can submit a case stating your email (rejections) are a false positive.  

I did so that very day but the customer wanted to fail-back to the site that never experienced the issue - who can blame them.  

So I am unsure if my "feedback" will stick if we fail-over yet again.  
They ask for your email but I have yet to receive a reply.  
Though they do say:

Threat Feedback
Your request has been submitted.. Our email response charter is 24-48 hours (Monday-Friday).

Thank you,
McAfee Customer Service Team
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Exchange

From novice to tech pro — start learning today.