Security Basics mailing list archives
Re: educating rDNS violators
From: JGrimshaw () ASAP com
Date: Mon, 23 Aug 2004 14:24:50 -0500
I was under the impression that reverse DNS for the Internet was essentially broken, due to several large ISPs not necessarily implementing reverse DNS for their many subnetted customers. With that in mind, with many customers using large ISPs for their public DNS service, a updating the bounce back message might not resolve anything, as the emailing site may not be in the authority to make the changes you have requested, and the large ISP may not have the wherewithall to implement such policies. While I agree that the reverse lookup is trivial to set up and likely should be setup, but it breeds complexity when outsourced to another vendor for management. SMiller () unimin com 08/18/2004 04:49 PM To security-basics () securityfocus com cc Subject educating rDNS violators Our mail administration group recently implemented blocking of all incoming messages from domains that cannot be resolved via reverseDNS, for purposes of spam prevention. Of course, there are quite a number of legitimate business contacts who do not have rDNS properly configured. Assuming that the rDNS criterion remains, the question becomes one of who will notify and/or educate the sender(s) about this issue. The only time-efficient way that I can think of to do this would be to have instructions and references in the body of the bounce message itself. Anyone tried that? Results? Other suggestions? Thanks in advance. Scott --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.securityfocus.com/sponsor/InfoSecInstitute_security-basics_040817 ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- educating rDNS violators SMiller (Aug 23)
- Re: educating rDNS violators token (Aug 24)
- Re: educating rDNS violators Derek Schaible (Aug 25)
- Message not available
- Re: educating rDNS violators Derek Schaible (Aug 25)
- RE: educating rDNS violators David Gillett (Aug 26)
- Re: educating rDNS violators token (Aug 26)
- RE: educating rDNS violators David Gillett (Aug 30)
- Re: educating rDNS violators Derek Schaible (Aug 25)
- Re: educating rDNS violators token (Aug 24)
- Re: educating rDNS violators Niek (Aug 26)
- Re: educating rDNS violators Derek Schaible (Aug 30)
- Re: educating rDNS violators James Kelly (Aug 25)
- Re: educating rDNS violators Bryan S. Sampsel (Aug 25)
- Re: educating rDNS violators SMiller (Aug 26)
- Re: educating rDNS violators Derek Schaible (Aug 25)
- Re: educating rDNS violators Mark Reis (Aug 28)
- Re: educating rDNS violators Derek Schaible (Aug 30)
- Re: educating rDNS violators Bryan S. Sampsel (Aug 30)
- <Possible follow-ups>
- Re: educating rDNS violators Eric Brown (Aug 24)
- RE: educating RDNS violators LordInfidel (Aug 26)