Suresh Ramasubramanian <[EMAIL PROTECTED]> wrote: [...] > Neither DUL, nor SORBS DUHL, nor the several other lesser known > variants can claim to do even a fraction of a perfect job - and > providers who do stuff like happily mix static IP and dynamic IP > netblocks, maintain vague or inconstant rDNS or even no rDNS at all > for these, etc don't help at all, leading to the usual funny > situation of someone's static IP dsl getting blocked as dynamic [but > that's another story altogether]
I agree that blocking based on any sort of DUL is asking for trouble, but recent experiments on our customer MXers has shown that applying greylisting to said hosts works a treat. Personally, I'd apply it across the board, but customers moan that important mail is being delayed. Nobody has yet complained that junk from compromised hosts is being delayed :) A side-effect of the greylisting and other mail checks is that I've got a lovely list of compromised hosts. Is there any way I can usefully share these with the community? -- PGP key ID E85DC776 - finger [EMAIL PROTECTED] for full key
