https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6075





--- Comment #17 from Mark Martinec <[email protected]>  2009-03-02 08:32:20 
PST ---
> > > When I run it, it gives me the following response:
> > > ./test.pl
> > > 216.234.246.150
> > 
> > Huh?  That doesn't look like a Spamhaus response...
> 
> At casual glance it looks like your ISP or DSN provider is running a DNS
> over-ride that returns a search website every time you enter an invalid 
> domain. 
> Verizon does this by default, it's evil. The "search site" returned is
> essentially a giant for-pay ad.
> More and more "end user" ISPs are doing this in order to try to get a little
> extra revenue, but it surprises me that a business class carrier would do it.

The 216.234.246.150 result here is easy to explain, the test program
failed to turn off the search list:  $res->dnsrch(0)  before the query,
so Net::DNS sent out two queries, for:
52.130.184.208.zen.spamhaus.org,  and for:
52.130.184.208.zen.spamhaus.org.net

The second query returned the 216.234.246.150.

This is not happening when Net::DNS is called by SpamAssassin,
the test was a red herring.


-- 
Configure bugmail: 
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

Reply via email to