* This is the vopmailbeta mailing list *
> The problem is that it would need to be implemented universally to be useful. We can't even safely turn on reverse DNS because many admins haven't properly set up reversing entries... Actually, that is not true. The logic would basically be, check if the sending site has the new records. If it does not (most current machines), then do nothing (allow mail thru). But, if it does have records (as, in theory, new machines will) check the connection against the authorized sending machines. If they match allow the mail thru, if they do not, block as spam. The specific part of the writeup that covers this is " If the sender has not configured RMX records, or the recipient's mail server does not bother to check them, then nothing changes. However, if RMX records have been configured, and the recipient does check them, then forgeries will be detected. What the recipient chooses to do with that information--throwing the message out immediately, passing it on as a special header for use by (for example) spamassassin or procmail, or ignoring it--is up to the recipient. Without breaking the Internet, RMX records make email forgery much more difficult. " Bill ** To leave this list, send an email to [EMAIL PROTECTED] and put the word "LEAVE" in the BODY of the email.
