Marc Perkel wrote:
> 
*snip*

> 
> Everyone has to start somewhere. This is in the early stages of 
> development. Right now it's security through obscurity. No one knows the 
> nost and port. Once I release it to a few people I'll use firewall 
> rulesto block access to only those who I have selected to feed data.
> 
Starting 'somewhere' with a bit more in the way of credible openers would help 
your cause.

It would inspire more confidence, for example, if you had said that you were 
*already* blocking <whatever> and would open individual paths as folks applied 
to join the experiment.

Few folk here are likely to want to damage you - I am getting too old to take 
on 
the job of town drunk, and few others have time to waste.

But that still leaves unanswered the bigger issue recently mentioned:

if/as/WHEN someone gets it wrong and sends you a ton of IP that are 
bass-ackwards - where then is your vetting or error-checking mechanism?

Methodology aside, do you even have the time and inclination to *attempt* 
vetting entries?  Or pruning/updating them?

RBL maintenance is not for dilletantes.  Check the history.

Bill


-- 
## List details at http://www.exim.org/mailman/listinfo/exim-users 
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://www.exim.org/eximwiki/

Reply via email to