On Thu, 2010-01-28 at 13:59 -0500, Adam Katz wrote:
> SpamCop sister-site SenderBase seems to indicate at > http://www.senderbase.org/senderbase_queries/detaildomain?search_string=hinet.net > that there isn't much traffic coming from IPs whose rDNS contain > 'dynamic.hinet.net' anyway, so it appears they've cleaned up. I see hundreds and hundreds of these a day here, though we deny access to all dynamic looking hostmarks via mitler-regex rules on the MTA's as well as outright deny no rDNS, so spam from them is in fact non existent. > I side with the complainer on this one. The rule is too broad, and, > like most SARE rules, it is probably stale. In its day, it was a very welcome rule, because as pointed out, spammers do have brains and know how to relay through "seemingly trusted hosts". I also know as many sys admins who outright block all of hinet in access file's, It is a decision I don't agree with, but each network must make its own decision based upon their own requirements.