jdow wrote:
From: "Marc Perkel" <[EMAIL PROTECTED]>

Rob McEwen (PowerView Systems) wrote:
Marc,

First, you should make a design decision up front... Are you going to allow IP addresses of valid hotmail and yahoo DNS servers (for example) which spew out a very high percentage of spams (especially nigeria scams) on your list, or not?

The only IPs I intend to list are going to be 100% spammers. So no Yahoo servers will be on it.

Gedanken Experiment....

Something I have noticed is that the various RBLs encode some properties
of the hits in the address returned. You might consider experimenting
with a beige list that pegs large ISPs like Yahoo, GMail, and AOL
who seem to be somewhat indiscriminate about signups. The return would
indicate whether there is current spam activity. Then the account name
could be looked up as a secondary request, name.reversedip.dnsbl. At
least these sites make it awkward to perform mass signups. And this
would tend to stifle the names right away.

(Might there be some way to use the additional information part of a
DNS return to cite active spam accounts directly?)

{^_^}



Here's what I'm trying. I'm using MyDNS but added a few fields. Basically I'm createing a white list and a black list. The while list merely prevents an IP from getting on the black list. An IP gets on the whitelist for 12 hours and on the blacklist for 4 hours. The idea being to prevent any source that sends any good email from accidentally being blacklisted.

Reply via email to