ietf-asrg
[Top] [All Lists]

Re: [MLIST] Re: [Asrg] Update to DS Protocol draft

2003-03-23 11:35:25
Assuming the DS idea is similar to my idea (outlined at 
http://www.vorteon.com/papers/spam_reduction_through_dns.html ),
this would prevent any open relay from delivering messages to my mail server 
where the real admin of the from domain had their DNS properly configured.
i.e
open relay = 10.3.3.3
MAIL FROM domain = aol.com

my mail server will check with the DNS server at aol.com and discover that the 
open relay at 10.3.3.3 is not a valid aol.com server and will not allow mail 
delivery.  This is a tremendous help as it limits the ability of a spammer to 
abuse an open relay with false message headers.  They could, of course, still 
abuse the open relay using the domain names that it is a legitimate server 
for.

On Sunday 23 March 2003 09:13 am, mathew wrote:
On Sunday, Mar 23, 2003, at 01:04 US/Eastern, william(_at_)elan(_dot_)net 
wrote:
III. As I already mentioned multiple times before this is typical
"RMX/Mail-From" style proposal which has the following problems:

[deleted]

Also, I don't see how this helps at all on a net where there are
hundreds of thousands of open relays, all of which we assume would have
valid designated-sender records and hence be allowed to relay spam to
you.


mathew

_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg

_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg