From: "Marc Perkel" <[EMAIL PROTECTED]>
Matt Kettler wrote:
Marc Perkel wrote:
I'm not thinking links, What I want to do is whitelist based on the
host name of the server connecting to my server.
You mean like bondedsender, and the current incarnation of Habeas?
(Habeas is no longer based on the SWE haiku)
Here's what I'm thinking. There are hosts out there who never send a
single spam. And the host is something that spammers can't fake. So if
we could somehow track that we could build a DNS list of hosts that
don't have to be tested with SA or could just sail through with no other
testing. For example, if the host name of the server that connects to me
is *.paypal.com then I know it's not spam. So why bother with any other
tests.
SA is slow and resource intensive. So what I try to do is avoid it with
DNS lists and Exim rules and use SA for what's left. this allows me to
process far more spam per server than if I ran SA on everything.
Also - I'm attempting to build a dns blacklist and I feed spam to other
services like spamcop so that they can blacklist off of my feed. So on
that feed and the data I forward I want to make sure that I never
accidentally block earthlink or gmail or aol or other hosts who do send
some spam. So that whitelist is for making sure that the host is never
blacklisted.
does anyone have a list of the major email providers like yahoo, gmail,
earthlink, etc who have some spam but should not ne blacklisted in DNS
lists?
Good idea. However, in past months I have received emailings from
E-Bay (correct path and all) and PayPal (aka e-bay and with correct
path and all) that are spams. I've also received email that is
genuine (and spam for a PayPal service) from a mailing service
PayPal apparently contracted with. I'd not make absolute decisions
on such a list given the computing power needed. Of course, this
is pretty much a one each followed by a several hour wait, me
logging into my appropriate account, sending a nastygram from
the account, and turning off these messages AGAIN. I typed in the
addresses. And waited for potential DNS contamination to perhaps
decay. (I did check the IP address for a "host" command just to
be paranoid.)
{o.o}