On Friday, January 21, 2005 at 4:08:59 PM, [EMAIL PROTECTED] confabulated:

> Duane Hill wrote:

>>  Somehow, I just don't see the kill list rejecting any of these:
>>
>>      *.abo.wanadoo.fr
>>      *.da.qwest.net
>>      *-pool-*
>>      *.dsl-verizon.net
>>      *.dip.t-dialin.net
>>      dialpool-*
>>      *.client.comcast.net
>>      dsl-*.mx
>>      *.bct.bellsouth.net
>>      *.dyn.optonline.net
>>      dsl-*.br
>>      *-*-*-*.client.mchsi.com
>>      *-*-*-*.dsl.*.pacbell.net
>>      *-*-*-*.dsl.*.ameritech.net
>>
>>  I've already tried setting them into the kill list as listed above. If 
>> there is some other
>>  special way of making it work, please, by all means, feel free to share 
>> with me the secret.
>>  
>>

> It appears to me that  the data your looking for is the name of the host 
> sending the mail.  It will be available in one of two places.

> 1.  During the initial SMTP greeting -- which cannot be trusted; 
> spammers can spoof this six ways from Sunday
> 2.  After the message is received and reverse DNS lookup is performed on 
> the sending IP -- which is about the only piece of data that can't be 
> spoofed.

> So, if you want accuracy, you'll need to receive the entire message.

> However, you may also want to look at http://www.blackholes.us.  Many of 
> the dynamic IP ranges you are looking to block are listed there in 
> various forms.  IIRC, the second step iMail takes is a DNSBL check on 
> the sending IP, and it will drop the connection if a DNSBL is configured 
> as "trusted"

  THANK YOU for reminding me! I totally forgot about blackholes.us.

  Our other MTA that we run allows me to do blacklisting by DNS name in which 
the MTA does the
  reverse lookup upon connection.

  Thanks for everyones input and aid on this.

-----

Duane Hill



To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to