On 4/10/2012 6:29 PM, RW wrote:
> On Tue, 10 Apr 2012 17:58:51 -0400
> Rob McEwen wrote:
>> Meanwhile, the snowshoe spammer's DNS server happens to be messed up,
>> overloaded, and returns answers within about 4 seconds.
> But unless I'm misunderstanding, the NS lookups would be done on the
> TLDs nameservers, rather than the spammer's DNS server.

The sneakiest of spammy domains are the ones NOT seen before, and thus
NOT is anyone's cache. Therefore, .../I WAS THINKING THAT... /the lookup
on the domain's NS server would OFTEN have to propagate back to the
authoritative DNS server for that domain.... that being the spammer's
DNS server... at the time the message is evaluated.

But you're right... maybe to get the DNS server assignment for that
domain, it only has to go to the TLD's nameserver, grabbing information
propagated to the TLD from the registrar for that domain. Good point!

(still much slower than DNSBL lookups to an rbldnsd server... but
probably not any slower than DNSBL lookups to a remote 3rd party DNS
blacklist)

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032

Reply via email to