Scott,

I've been thinking about this for a while as a way to increase spam detection and do things that are otherwise more difficult to do, and then the other day I found that MailPolice was actually promoting their RHSBL's for use on both the Mail From and the reverse DNS entry, and now they have a zone that is built to detect DUL users using reverse DNS entries.  I think that both additions would be very useful for spam blocking.  Here's their current list of zones:
bulk.rhs.mailpolice.com - domains used to send or host spam/bulk-sender/unconfirmed mailing lists/advertising sites
porn.rhs.mailpolice.com - domains used to send or host pornographic sites
block.rhs.mailpolice.com - combined porn.rhs.mailpolice.com and bulk.rhs.mailpolice.com
dynamic.rhs.mailpolice.com - dynamic PPP/DSL/cable reverse DNS hostnames, useful for stopping spam from broadband proxies
fraud.rhs.mailpolice.com - domains and IPs hosting fraudulant content, aka "phishing"

I've found that there are many foreign providers that aren't listed in the free DUL/DHUL/DYNA lists, but it is often easy to identify their naming conventions with senderbase.org and add them to a DUL filter.  It seems though that MailPolice has already done much of this work for us.  Also of note is that fact that many spammers, while they change the Mail From from campaign to campaign, tend to not change their reverse DNS entries as often, and this would again lead to better/earlier detection of static spammers that attempt to obfuscate.

Is there any shot of you enabling a different type of test built to do RHS lookups from the reverse DNS value?

Thanks,

Matt
-- 
=====================================================
MailPure custom filters for Declude JunkMail Pro.
http://www.mailpure.com/software/
=====================================================


Reply via email to