-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Tony Finch writes: > On Mon, 29 Mar 2004, Jeff Chan wrote: > > > > So a technique to defeat the randomizers greater count is to look > > at the higher levels of the domain, under which SURBL will always > > count the randomized children of the "bad" parent. In this case > > the URI diversity created through randomization hurts the spammer > > by increasing the number of unique reports and increasing the > > report count of their parent domain, making them more likely to > > be added to SURBL. (Dooh, this paragraph is redundant...) > > Another approach is to blacklist nameservers that host spamvertized > domains. If an email address or a URI uses a domain name whose nameservers > are blacklisted (e.g. the SBL has appropriate listing criteria), or if the > reverse DNS is hosted on blacklisted nameservers, these may be grounds for > increasing the score. > > I don't know if SA does this check yet. Yep, it does -- that's what the URIBL plugin does currently. - --j. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Exmh CVS iD8DBQFAaGuKQTcbUG5Y7woRAra7AKDemalfVvMXd9in3b+DTTuCSco4mACg5ySk HmqOkWPCNJUam1alF1aqnP8= =cBGw -----END PGP SIGNATURE-----
