Re: DNS Blacklist Policy Design

2006-06-06 Thread Marc Perkel
All the stuff on my list is either honnypot accounts or people impersonating my domains or other trickery. So they can't get around it by sending good messages because they get listed by who that sent the messages too. None of those listed are processed by Spamassassin. So if there's any good

Re: DNS Blacklist Policy Design

2006-06-05 Thread Rob McEwen (PowerView Systems)
Marc, First, you should make a design decision up front... Are you going to allow IP addresses of valid hotmail and yahoo DNS servers (for example) which spew out a very high percentage of spams (especially nigeria scams) on your list, or not? Personally, I think that it is better to NOT try

Re: DNS Blacklist Policy Design

2006-06-05 Thread Marc Perkel
Rob McEwen (PowerView Systems) wrote: Marc, First, you should make a design decision up front... Are you going to allow IP addresses of valid hotmail and yahoo DNS servers (for example) which spew out a very high percentage of spams (especially nigeria scams) on your list, or not? The

Re: DNS Blacklist Policy Design

2006-06-05 Thread jdow
From: Marc Perkel [EMAIL PROTECTED] Rob McEwen (PowerView Systems) wrote: Marc, First, you should make a design decision up front... Are you going to allow IP addresses of valid hotmail and yahoo DNS servers (for example) which spew out a very high percentage of spams (especially nigeria

Re: DNS Blacklist Policy Design

2006-06-05 Thread Marc Perkel
jdow wrote: From: Marc Perkel [EMAIL PROTECTED] Rob McEwen (PowerView Systems) wrote: Marc, First, you should make a design decision up front... Are you going to allow IP addresses of valid hotmail and yahoo DNS servers (for example) which spew out a very high percentage of spams

Re: DNS Blacklist Policy Design

2006-06-05 Thread List Mail User
... Here's what I'm trying. I'm using MyDNS but added a few fields. Basically I'm createing a white list and a black list. The while list merely prevents an IP from getting on the black list. An IP gets on the whitelist for 12 hours and on the blacklist for 4 hours. The idea being to prevent

Re: DNS Blacklist Policy Design

2006-06-05 Thread jdow
From: List Mail User [EMAIL PROTECTED] All of this would use up 6 bits and still leave 17 for any other purposes you have in mind (assuming codes from 127.0.0.2 to 127.0.0.126). Uses up 6 of the 7 bits in that range, Paul. Did you mean 127.0.0.2 through 127.255.255.254? {o.o}

Re: DNS Blacklist Policy Design

2006-06-05 Thread List Mail User
... From: List Mail User [EMAIL PROTECTED] All of this would use up 6 bits and still leave 17 for any other purposes you have in mind (assuming codes from 127.0.0.2 to 127.0.0.126). Uses up 6 of the 7 bits in that range, Paul. Did you mean 127.0.0.2 through 127.255.255.254? {o.o} No

Re: DNS Blacklist Policy Design

2006-06-05 Thread jdow
From: List Mail User [EMAIL PROTECTED] ... From: List Mail User [EMAIL PROTECTED] All of this would use up 6 bits and still leave 17 for any other purposes you have in mind (assuming codes from 127.0.0.2 to 127.0.0.126). Uses up 6 of the 7 bits in that range, Paul. Did you mean 127.0.0.2

RE: DNS Blacklist Policy Design

2006-06-05 Thread Rob McEwen
Paul, I've always thought of you as chief scientist among everyone on the spam assassin list... I've seen you dissect the inner mysterious workings of a spam like no other... uncovering the spammer's tracks like a superhero FBI agent meticulously piecing together data from the forensics lab.

Re: DNS Blacklist Policy Design

2006-06-05 Thread List Mail User
... From: List Mail User [EMAIL PROTECTED] ... From: List Mail User [EMAIL PROTECTED] All of this would use up 6 bits and still leave 17 for any other purposes you have in mind (assuming codes from 127.0.0.2 to 127.0.0.126). Uses up 6 of the 7 bits in that range, Paul. Did you mean 127.0.0.2

RE: DNS Blacklist Policy Design

2006-06-05 Thread List Mail User
... Paul, I've always thought of you as chief scientist among everyone on the spam assassin list... I've seen you dissect the inner mysterious workings of a spam like no other... uncovering the spammer's tracks like a superhero FBI agent meticulously piecing together data from the forensics lab.