Bill Landry wrote:
> This issue has been unresolved for way too long.  All of this, in my
> mind, this makes the plugin orphaned and unusable if not patched with
> Mark's patch.

No matter how hard you try to improve botnet:

(A) botnet is still dependent on third party dns servers, many of which
are poorly configured, overburdened, squeezed of bandwidth, etc.

(B) Even if that were not true, botnet:STILL won't ever "scale" that
particularly well

(C) By design, botnet is always going to be "asleep at the wheel" with
regards to correcting its own mistakes. What i mean by this is that...
consider a DNSBL which misfires on certain IPs on rare occasions due to
part poor rDNS  configurations of the senders... so that the sender is
at least partly to blame.... BUT... where it is determined that listing
the IP would block little-to-zero spam, and would generate many FPs.
With a well-run DNSBL, there is a feedback mechanism to the DNSBL
operator--often the sender can get alerted to their problem--and the
sender has a means to figure out the source of their problems more
easily--and once that feedback (from senders or recipients) gets back to
the DNSBL operator, an exception can then be made for such IPs so that
they can then stay off the dnsbl. Botnet doesn't have these types of
checks-and-balances or feedback mechanisms which lead to critical and
justifiable adjustments for some of those exceptional cases.

Not that botnet isn't useful... and I think the concept is wonderful and
the author should be praised... but anyone trying to use the botnet
plugin as the "end all" replacement for DNSBLs, or the "bridge all gaps"
from their existing DNSBLs' shortcomings... should be aware of these
limitations I mentioned.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032


Reply via email to