Hopefully we will come to some cooperating directions. One that might be the *trust* way, where we deal with x.509 certificate to manage a trust of mta (sharing the policies regarding spam) Kind of mail *peering*.
One might be the credit way, where we score mta's, and longer they prove their good behaviour, higher credits they get. (a bit like clearinghouse scoring (dccd)) :-) On Thu, Feb 12, 2004 at 03:06:26PM +0100, Daniel Lorch typed: :: -----BEGIN PGP SIGNED MESSAGE----- :: Hash: SHA1 :: :: hi :: :: | Is the argument *this host has a PTR RR* meant as *official* mta, :: | or *this host has a PTR RR resolving the same as the mta's hostname :: | in the smtp handshaking? :: :: If we're at it: How paranoid are your MTAs? If a server connects :: to mine I do a PTR lookup for the connecting host IP. If a PTR :: exists, I allow the connection, if not, I fail. :: :: But the existence of a PTR alone doesn't guarantee anything. The :: PTR should also be verified (check whether reverse and forward :: lookup match). :: :: Is anyone doing this? I quickly looked through my inbox and manually :: checked a couple of mailservers I found. If I would be verifying :: the PTR, half of my (legit) mails wouldn't be coming through any- :: more. :: :: daniel :: :: -----BEGIN PGP SIGNATURE----- :: Version: GnuPG v1.2.1 (Darwin) :: Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org :: :: iD8DBQFAK4hiS2WJ/hBy2k8RAnQgAJ9OA6pm0AnFtospAPsf7kS+4Ua/jACeNDRK :: pVuQW7mwK4PwKyi4GeAQhgQ= :: =Wmzd :: -----END PGP SIGNATURE----- :: ---------------------------------------------- :: [EMAIL PROTECTED] Maillist-Archive: :: http://www.mail-archive.com/swinog%40swinog.ch/ -- Key fingerprint = C549 46E1 1B75 116E 3321 BC0A E502 9457 319E B340 RFC822: [EMAIL PROTECTED] || [EMAIL PROTECTED] << www.NetBSD.org ---------------------------------------------- [EMAIL PROTECTED] Maillist-Archive: http://www.mail-archive.com/swinog%40swinog.ch/