On Tue, Apr 17, 2012 at 12:55:05PM +0200, Claudius wrote:
> On 2012-04-17 12:04, Sam Jones wrote:
> 
> > And I would add that an inbound MX does not necessarily === the 
> > same outbound server a domain would use. Typically anti-spam 
> > gateways or hosted services used inbound on one IP, whereas 
> > outbound mail coming from another IP and server.
> > 
> > Just imagine whitelisting a shared, spammy server because a 
> > domain is hosted on it. Naturally it will probably come through 
> > greylisting in the end anyway, but I'd not go out of my way to 
> > make it easy on them!
> >
> Valid point, thanks for the input.

Eh, I'd call that a red herring.

> That's why I decided to white-list
> with a date in the past. In case there is no reply the
> white-list goes away soon.
> The main idea of this script was to have faster replies for mails 
> to people we have sent mail ourselves. Some mail servers have 
> ridiculously long retry periods and waiting an hour for a mail 
> "just sent" made people impatient. This actually helped a lot.
> I could do a SPF lookup to white-list the outgoing remote servers 
> though.

That would make sense. As long as your whitelist merely bypasses 
greylisting you're not going to cause much harm with it.

> On 2012-04-17 11:50, Reindl Harald wrote:
> >
> > are you aware that you are whitelisting this way
> > servers which sent spam to a user with autorply?
> >
> Haven't actually though about that. Thanks for bringing it up. I 
> guess filtering autoreplies would be a good idea if I can figure 
> out how.

In itself this is not a significant issue. An autoreply to spam is 
rarely going to go to the spammer: it will go to an innocent third 
party, or to an address which is not valid.
-- 
  http://rob0.nodns4.us/ -- system administration and consulting
  Offlist GMX mail is seen only if "/dev/rob0" is in the Subject:

Reply via email to