Unless the network is lying to me again, Vincent de Lau said: 

> Thanks to CIDR, reverse DNS got a very different face. I do not have control
> over my reverse DNS zone, because I'm not the only one that is in that
> network. (netmask /26)

Only because your upstream is not clued.  This is quite easy to do in 
a number of different ways.  

If your PROVIDER can do something like this:

$ORIGIN 35.72.212.in-addr.arpa.
220     IN      CNAME   220.rev.your.domain.
221     IN      CNAME   221.rev.your.domain.
222     IN      CNAME   221.rev.your.domain.
223     IN      CNAME   221.rev.your.domain.

Then, in YOUR dns you have:

$ORIGIN rev.your.domain.
220     IN      PTR     www.my.domain.
221     IN      PTR     other.my.domain.
222     IN      PTR     third.my.domain.
223     IN      PTR     vpn.my.domain.

> I think reverse DNS checking is not a good way to "authenticate" this kind
> of traffic.

Until you come up with something better (and that is easy to deploy)...

AlanC
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to