-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thursday, March 20, 2003, Johannes Posel wrote...

>> The RBL lists would block 192.168.0.0/24 instead of just the later
>> half of the range.

> I'd see this analogy, with 192.168.* being dial-up and 10.0.* beign
> fixed-IP customers.

Then you wouldn't have an issue with them blocking the dialup blocks.
My example shows that an RBL could block the ISDN block as well as the
dialup.

>> That's an odd stance. Last time I checked (and as you stated), AOL
>> bounce mail to their own SMTP servers.

> No, I mean like this: A mail server gets an incoming connection from
> an IP which belongs to AOL. It refuses this connection except if
> this IP beongs to the listed AOL MXes. See what I mean?

Yes I know... but last time I checked, AOL didn't allow outbound
connections on port 25, and were bounced through their own SMTP
servers. This'd result in a firewall rule that didn't do anything as
the connections could never reach you as per AOL. But I could be
wrong.

>> an example) for example. It just changes your name when somebody does
>> a lookup. If you're blocking by IP range (which is what RBLs do),
>> names don't mean a thing.

> Which RBL are we talking about?

RBLs store IP addresses, not names. Your mail server looks up
addresses based on IP address... if it is listed, then it gets
blocked. The problem is, some RBLs blacklist whole segments without
much research... as Marck found out.

Talking of which *grins*... I think this thread could be moved to TBOT
now before it gets flogged ;)

- --
Jonathan Angliss
([EMAIL PROTECTED])

-----BEGIN PGP SIGNATURE-----

iQA/AwUBPnpS4yuD6BT4/R9zEQKnngCfVGaoDJGlwm+1dhrdsHsntSwgeSAAn3VK
lppOBzhcghXqeliBANIn7piR
=U/df
-----END PGP SIGNATURE-----


________________________________________________
Current version is 1.62 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to