On 20 Nov 2024, Andy Smith uttered the following:
> Hi,
>
> On Wed, Nov 20, 2024 at 05:07:09PM +, Nix wrote:
>> > From
>> > https://knowledge.validity.com/s/articles/Accessing-Validity-reputation-data-through-DNS
>> > :
>>
>> Tried registering here. I can register a v4 address, but every fo
Nick Howitt writes:
>> ... the account is free and then they hit you with an EULA that says
>>
>>> The Services are available at the then-current rate. Customer shall
>>> pay all applicable fees when due as invoiced and, if fees are being
>>> paid via credit card or other electronic means, Custo
Hi,
On Wed, Nov 20, 2024 at 05:07:09PM +, Nix wrote:
> > From
> > https://knowledge.validity.com/s/articles/Accessing-Validity-reputation-data-through-DNS
> > :
>
> Tried registering here. I can register a v4 address, but every format of
> v6 CIDR I've tried reports "Invalid V6_CIDR" with (
Nix wrote:
On 19 Nov 2024, Matija Nalis stated:
On Mon, Nov 18, 2024 at 05:21:12PM +, Nix wrote:
I'm not a high-volume site, a few thousand mails a day. If I'm blocked,
probably more or less everyone is being blocked. (Are the DNSBLs above
Yes, pretty much every non-paying customer is bl
On 19 Nov 2024, Matija Nalis stated:
> On Mon, Nov 18, 2024 at 05:21:12PM +, Nix wrote:
>> I'm not a high-volume site, a few thousand mails a day. If I'm blocked,
>> probably more or less everyone is being blocked. (Are the DNSBLs above
>
> Yes, pretty much every non-paying customer is blocked
On 20/11/2024 17:07, Nix wrote:
On 19 Nov 2024, Matija Nalis stated:
On Mon, Nov 18, 2024 at 05:21:12PM +, Nix wrote:
I'm not a high-volume site, a few thousand mails a day. If I'm blocked,
probably more or less everyone is being blocked. (Are the DNSBLs above
Yes, pretty much every n
On 20/11/2024 16:39, Nix wrote:
On 20 Nov 2024, Nick Howitt uttered the following:
On 20/11/2024 12:55, Nix wrote:
On 19 Nov 2024, Greg Troxel told this:
Matija Nalis writes:
From
https://knowledge.validity.com/s/articles/Accessing-Validity-reputation-data-through-DNS
:
Star
On 20 Nov 2024, Nick Howitt uttered the following:
>
>
> On 20/11/2024 12:55, Nix wrote:
>> On 19 Nov 2024, Greg Troxel told this:
>>
>>> Matija Nalis writes:
>>>
From
https://knowledge.validity.com/s/articles/Accessing-Validity-reputation-data-through-DNS
:
> Starti
On 19 Nov 2024, Greg Troxel told this:
> Matija Nalis writes:
>
>> From
>> https://knowledge.validity.com/s/articles/Accessing-Validity-reputation-data-through-DNS
>> :
>>
>>> Starting March 1, 2024, Validity will allow up to 10,000 requests to
>>> anonymous users over a 30-day period.
>>
>>
On 20/11/2024 12:55, Nix wrote:
On 19 Nov 2024, Greg Troxel told this:
Matija Nalis writes:
From
https://knowledge.validity.com/s/articles/Accessing-Validity-reputation-data-through-DNS
:
Starting March 1, 2024, Validity will allow up to 10,000 requests to
anonymous users over a 3
On 19 Nov 2024, Matus UHLAR stated:
>>On 18 Nov 2024, Bill Cole spake thusly:
>>> If you forward DNS queries instead of running your own *fully
>>> recursive* DNS resolver locally, you *look* like you are part of a
>>> high-volume leech. This almost certainly does not mean you should run
>>> dnsma
> 10k requests per 30-day period is about 333 queries/day. Or less than 14
> queries per hour.
> Not very much at all (and certainly at least order of magnitude less than
> your stated traffic).
> No amount of local DNS caching is going to fix limits *that low*.
Just a reminder that there is n
Nick Howitt writes:
>> Has SA doctrine changed in terms of default ruleset inclusion of RBLs
>> that block small sites with properly-configured resolvers? I managed
>> to miss the new feature of detecting blockage and disabling that RBL,
>> and I can see that with that feature, having default r
On 19/11/2024 13:53, Greg Troxel wrote:
Matija Nalis writes:
Fromhttps://knowledge.validity.com/s/articles/Accessing-Validity-reputation-data-through-DNS
:
Starting March 1, 2024, Validity will allow up to 10,000 requests to
anonymous users over a 30-day period.
10k requests per 30-da
Matija Nalis writes:
> From
> https://knowledge.validity.com/s/articles/Accessing-Validity-reputation-data-through-DNS
> :
>
>> Starting March 1, 2024, Validity will allow up to 10,000 requests to
>> anonymous users over a 30-day period.
>
> 10k requests per 30-day period is about 333 queries
On 19/11/2024 10:27, Matus UHLAR - fantomas wrote:
The point of the big ugly error message is to have a big ugly error
message. MOST people who report problems with SA accuracy here have
misconfigured their resolvers, apparently because they don't trust
documentation or don't read it.
Not
On 18 Nov 2024, Bill Cole spake thusly:
If you forward DNS queries instead of running your own *fully
recursive* DNS resolver locally, you *look* like you are part of a
high-volume leech. This almost certainly does not mean you should run
dnsmasq locally, it means you need a REAL resolver. Unboun
On Mon, Nov 18, 2024 at 05:21:12PM +, Nix wrote:
> I'm not a high-volume site, a few thousand mails a day. If I'm blocked,
> probably more or less everyone is being blocked. (Are the DNSBLs above
Yes, pretty much every non-paying customer is blocked...
>From
>https://knowledge.validity.com/s
On 18 Nov 2024, Bill Cole spake thusly:
> On 2024-11-18 at 12:21:12 UTC-0500 (Mon, 18 Nov 2024 17:21:12 +)
> Nix
> is rumored to have said:
>
>> On 14 Nov 2024, Mark London uttered the following:
>>
>>> FWIW, Today I discovered that RCVD_IN_VALIDITY_CERTIFIED,
>>> RCVD_IN_VALIDITY_RPBL, and
On 18 Nov 2024, Nick Howitt stated:
> The RBL's check the referring DNS Server. if you use someone like OpenDNS or
> GoogleDNS, as many others do then, as far as the RBL
> list is concernet it is receiving too many queries via those DNS servers.
>
> If you want to use these RBL's, it is recommend
On 2024-11-18 at 12:21:12 UTC-0500 (Mon, 18 Nov 2024 17:21:12 +)
Nix
is rumored to have said:
> On 14 Nov 2024, Mark London uttered the following:
>
>> FWIW, Today I discovered that RCVD_IN_VALIDITY_CERTIFIED,
>> RCVD_IN_VALIDITY_RPBL, and RCVD_IN_VALIDITY_SAFE, were being triggered for
>> e
The RBL's check the referring DNS Server. if you use someone like
OpenDNS or GoogleDNS, as many others do then, as far as the RBL list is
concernet it is receiving too many queries via those DNS servers.
If you want to use these RBL's, it is recommended you run your own
recursive DNS server ra
On 14 Nov 2024, Mark London uttered the following:
> FWIW, Today I discovered that RCVD_IN_VALIDITY_CERTIFIED,
> RCVD_IN_VALIDITY_RPBL, and RCVD_IN_VALIDITY_SAFE, were being triggered for
> every email that our server received. I do not use a public DNS server. I
> disabled all of them. Stran
Matus - Oops! I had installed a new email server last year, running
Ubuntu, and I didn't realize by default, updating is off.
After updating, I see that we are getting blocked by RCVD_IN_VALIDITY.
My bad. Thanks very much! - Mark
On 11/14/2024 8:44 PM, uh...@fantomas.sk wrote:
From:
Matus
On 14.11.24 15:31, Matija Nalis wrote:
I'm not using VALIDITY for SA, but I do periodic checks with Icinga
check_rbl if my mailservers did get on any blacklist, and about 2
days ago I've got alerts that ALL of mailservers were suddenly on
Validity Senderscore blacklist:
CHECK_RBL CRITICAL - x.x.
They probably tightened up their AUP / enforcement...
I'm not using VALIDITY for SA, but I do periodic checks with Icinga
check_rbl if my mailservers did get on any blacklist, and about 2
days ago I've got alerts that ALL of mailservers were suddenly on
Validity Senderscore blacklist:
CHECK_RBL C
On 13.11.24 22:15, Mark London wrote:
FWIW, Today I discovered that RCVD_IN_VALIDITY_CERTIFIED,
RCVD_IN_VALIDITY_RPBL, and RCVD_IN_VALIDITY_SAFE, were being triggered
for every email that our server received. I do not use a public DNS
server. I disabled all of them. Strange. - Mark
Do you
On 11/13/2024 10:15 PM, Mark London wrote:
FWIW, Today I discovered that RCVD_IN_VALIDITY_CERTIFIED,
RCVD_IN_VALIDITY_RPBL, and RCVD_IN_VALIDITY_SAFE, were being triggered
for every email that our server received. I do not use a public DNS
server. I disabled all of them. Strange. - Mark
28 matches
Mail list logo