Am 15.04.2025 um 16:33:32 Uhr schrieb Benoit Panizzon via mailop: > I suspect they still see requests from our caching DNS servers. We are > an ISP. We offer internet access to businesses who operate their own > mail server and most probably use our caching DNS resolver.
Spying on them is not your business as long they don't abuse anything. If the dnsbl operator decides to have a public dnsbl, people will poll it. :-) > As we don't log client requests on our DNS server, we have no means to > find which of our customers cause those remaining requests. But this > makes me wonder - how does Validity handle and distinguish customer > behind the same DNS server? As long as they don't use specific domains for each (paying) customer, they can't distinguish. Such open resolvers can be used to run attacks against the dnsbl if many different queries are being sent there. E.g. they could use 34f893h4f9834hf.dnsbl.example.org for one customer and only allow queries to those subdomains. > Behind 8.8.8.8 as example? Do they require > each customer to operate an own local DNS resolver? I dunno how validity handles that, but certain dnsbl operators don't allow queries from public resolvers. -- Gruß Marco Send unsolicited bulk mail to 1744727612mu...@cartoonies.org _______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop