On Mon, 3 Jun 2002 03:47, Noel J. Bergman wrote:
> Right now InSpammerBlacklist checks the remote address of the proximate
> relay to see if it is open.  Is that sufficient?  We are trusting that
> relay to filter out e-mail from open relay sources.
>
> Should we be (at least optionally) checking the entire series, and
> rejecting if we find any open server in the chain?

Ideally yes.

Most email programs only check the IP address that is being used to make the 
connection, it's much easier to code that way and impossible to fool.

But what we would ideally like to do is catch the case where an ISP customer 
is running an open relay and the ISP relays mail for it's customers.  Then 
the ISP relay may be operating correctly but allowing spam through from it's 
customer.  ORBS used to run two separate lists for such things, one would 
list the spam outputs (ISP relays) and the other would list the spam inputs 
(open relays run by ISP customers).

I don't think that the current DNSBL setups give you that choice now 
(although I haven't investigated it closely - my email setup only allows 
filtering on IP address used to make the connection).

-- 
I do not get viruses because I do not use MS software.
If you use Outlook then please do not put my email address in your
address-book so that WHEN you get a virus it won't use my address in the
>From field.

--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to