On Tue, 9 Feb 2010 11:42:07 -0500
dar...@chaosreigns.com wrote:

> On 02/09, RW wrote:

> > What your
> > scheme would do is check for otherwise legitimate servers that have
> > been compromised and are delivering direct-to-mx. 
> 
> An otherwise legitimate but compromised mail server would not be
> detected by this.  I'm curious why you interpreted it differently.

A compromised webserver with full-circle DNS would be caught by this.
My point is that is the only class of spam that this could help with

Every thing else is either handled by full-circle and no DNS tests,
or can be easily worked around by spammers setting their own dns.




Reply via email to