Am 15.04.2025 um 16:33:32 Uhr schrieb Benoit Panizzon via mailop:

> I suspect they still see requests from our caching DNS servers. We are
> an ISP. We offer internet access to businesses who operate their own
> mail server and most probably use our caching DNS resolver.

Spying on them is not your business as long they don't abuse
anything. If the dnsbl operator decides to have a public dnsbl, people
will poll it.
:-)

> As we don't log client requests on our DNS server, we have no means to
> find which of our customers cause those remaining requests. But this
> makes me wonder - how does Validity handle and distinguish customer
> behind the same DNS server?

As long as they don't use specific domains for each (paying) customer,
they can't distinguish. Such open resolvers can be used to run attacks
against the dnsbl if many different queries are being sent there.

E.g. they could use 34f893h4f9834hf.dnsbl.example.org for one customer
and only allow queries to those subdomains.

> Behind 8.8.8.8 as example? Do they require
> each customer to operate an own local DNS resolver?

I dunno how validity handles that, but certain dnsbl operators don't
allow queries from public resolvers.

-- 
Gruß
Marco

Send unsolicited bulk mail to 1744727612mu...@cartoonies.org
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to