"I don't know of anyone who implemented it." :(
Aloha, Michael. -- Michael J Wise | Microsoft | Spam Analysis | "Your Spam Specimen Has Been Processed." | Got the Junk Mail Reporting Tool ? -----Original Message----- From: mailop [mailto:[email protected]] On Behalf Of Steve Atkins Sent: Thursday, January 21, 2016 11:57 AM To: [email protected] Subject: Re: [mailop] Spurious 'Client host [xyz] blocked using b.barracudacentral.org' replies > On Jan 21, 2016, at 11:35 AM, Michael Wise <[email protected]> wrote: > > Back In The Day, there was a BCP for shutting down a DNSBL that included > running a daily check of the IP 127.0.0.1 (which should never hit), IIRC, as > well as 127.0.0.2 (which should always return a hit); and if my memory > serves, if either criteria was different (both listed or neither listed), the > DNSBL should be flagged as not to be trusted. > > This is from memory, I remember a discussion … a decade or so ago? It's an obviously sensible thing to do, simple, cheap and doesn't require any cooperation from the DNSBL operator more than all (but three) DNSBLs I know of already do. IIRC it's explicitly called out as something you can do in Chris and Matt's DNSBL RFC. I don't know of anyone who implemented it. Cheers, Steve _______________________________________________ mailop mailing list [email protected] https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fchilli.nosignal.org%2fcgi-bin%2fmailman%2flistinfo%2fmailop%0a&data=01%7c01%7cmichael.wise%40microsoft.com%7cdd7b2ee3255940b02da908d3229dda04%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=oXEjkqFp8jfgTUk0uPtw0hUDr%2b8hlOSblOauzoSTHg4%3d _______________________________________________ mailop mailing list [email protected] https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
