Am 24.10.2014 um 14:34 schrieb Joe Quinn:
On 10/24/2014 7:25 AM, Paul Stead wrote:
Not sure if this is a legit listing, however it's causing problems for
some of my user base.

I've added btconnect.com to my uridnsbl_skip_domain list

Nothing legit came up when we were spot-checking the domain, but
apparently it's the public mail domain for British Telecom...

Should now be fixed

their dialup-stuff has PTR's like
host81-130-209-129.in-addr.btopenworld.com

that's better catched with "check_reverse_client_hostname_access" because from the moment it's a legit server with a sane PTR any host can be excluded while compromised endusers still get blocked without the ressource usage of a contentfilter

/^host[\.\-]?[0-9]{1,3}[\.\-][0-9]{1,3}[\.\-][0-9]{1,3}[\.\-][0-9]{1,3}[\.\-]?in[\.\-]addr[\.\-]btopenworld\.com$/ REJECT Generic DNS-Reverse-Lookup (PTR-Rule: 97) see http://www.emailtalk.org/ptr.aspx and https://www.ietf.org/rfc/rfc1912.txt

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to