On Tue, 29 Mar 2005, at 12:25, David MacQuigg wrote:
I can even see a large ISP clustering all their servers so their SPF record
might be nothing but a few masks. As long as spammers can't get access to
the addresses within the mask blocks, the masks alone are good enough.
A typical top record might look like this one for rr.com:
The ... redirects and such might never be needed if rr.com decides it can
clean out the zombies in each of those /24 blocks.
Our servers already _are_ clustered in the /24s we list; we list so
many /24s because we have our servers located in nine different
geographically dispersed data centers stretching from New York to
California, and the rules of the game as they apply to routing and
so forth do not allow us to put all nine data centers into that
many fewer /24s than what we have listed. The first four /24s
listed above are all in one geographic location, but in-house
political reasons do not allow them to be collapsed into one
The /24s in our SPF record are reserved for data center usage;
servers, network gear, etc. No customers are put in those /24s.
The zombies that are on our network are not in the /24s listed in
our SPF record. Zombies that are configured to route their spew
from the infected host through the smarthost configured on the
infected host's mail client will be rate limited, as a matter of
policy, to 1,000 messages per day.
Note too that our SPF record currently ends in ~all, not the -all
you listed here. Unless and until our AUP changes (and there's
no promise that it ever will), our SPF record will likely never
end in -all. We have customers who wish to run their own mail
servers in our residential space, and some of them even send
email from their $foo.rr.com addresses; we currently allow this
practice and make no promises that we will ever change this.
Senior Security Policy Specialist/Postmaster V: 703.345.2447
Time Warner Cable IP Security M: 571.344.8619