On Mon, 3 Jun 2002 03:47, Noel J. Bergman wrote: > Right now InSpammerBlacklist checks the remote address of the proximate > relay to see if it is open. Is that sufficient? We are trusting that > relay to filter out e-mail from open relay sources. > > Should we be (at least optionally) checking the entire series, and > rejecting if we find any open server in the chain?
Ideally yes. Most email programs only check the IP address that is being used to make the connection, it's much easier to code that way and impossible to fool. But what we would ideally like to do is catch the case where an ISP customer is running an open relay and the ISP relays mail for it's customers. Then the ISP relay may be operating correctly but allowing spam through from it's customer. ORBS used to run two separate lists for such things, one would list the spam outputs (ISP relays) and the other would list the spam inputs (open relays run by ISP customers). I don't think that the current DNSBL setups give you that choice now (although I haven't investigated it closely - my email setup only allows filtering on IP address used to make the connection). -- I do not get viruses because I do not use MS software. If you use Outlook then please do not put my email address in your address-book so that WHEN you get a virus it won't use my address in the >From field. -- To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>
