Henrique de Moraes Holschuh <[EMAIL PROTECTED]> writes:

> You can, for example, use dynamic IP supersets to do the greylisting
> "triplet" match.  Now the problem is a matter of creating the supersets in a
> way to not break incoming email from outgoing-SMTP clusters.

Is there a way of doing this which doesn't require you to know in
advance the setup of remote networks and such?  Does it scale?

> You can also only graylist sites which match a set of conditions that flag
> them as suspicious.  Depending on what conditions you set, you do not have
> the risk of blocking any server farms we would want to talk SMTP to.

You don't have the risk?  Are you saying that there is exactly *zero*
risk?  Please, if you don't mean that, be more precise.

>> So far, all I have seen in response to this particular problem is to
>> say that "properly configured" includes an exactly accurate hardcoded
>> list of all such sites on the internet.
>
> Then you are hearing differently now.

What ar the "dynamic IP supersets" you speak of, then?

>> Another problem is with hosts that do not accept a message from an MTA
>> unless that MTA is willing to accept replies.  This is a common spam
>> prevention measure.  The graylisting host cannot then send mail to
>> such sites until they've been whitelisted, because when they try the
>> reverse connection out, it always gets a 4xx error.  I've been bitten
>
> Why will the host implementing incoming graylisting *always* get a 4xx error
> on his outgoing message?  I am curious.

The other way round.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to