https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6075
--- Comment #17 from Mark Martinec <[email protected]> 2009-03-02 08:32:20 PST --- > > > When I run it, it gives me the following response: > > > ./test.pl > > > 216.234.246.150 > > > > Huh? That doesn't look like a Spamhaus response... > > At casual glance it looks like your ISP or DSN provider is running a DNS > over-ride that returns a search website every time you enter an invalid > domain. > Verizon does this by default, it's evil. The "search site" returned is > essentially a giant for-pay ad. > More and more "end user" ISPs are doing this in order to try to get a little > extra revenue, but it surprises me that a business class carrier would do it. The 216.234.246.150 result here is easy to explain, the test program failed to turn off the search list: $res->dnsrch(0) before the query, so Net::DNS sent out two queries, for: 52.130.184.208.zen.spamhaus.org, and for: 52.130.184.208.zen.spamhaus.org.net The second query returned the 216.234.246.150. This is not happening when Net::DNS is called by SpamAssassin, the test was a red herring. -- Configure bugmail: https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug.
