[142290] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Address Assignment Question

daemon@ATHENA.MIT.EDU (=?UTF-8?B?SsOpcsO0bWUgTmljb2xsZQ==)
Mon Jun 20 18:16:48 2011

In-Reply-To: <20110620215510.2627.qmail@joyce.lan>
From: =?UTF-8?B?SsOpcsO0bWUgTmljb2xsZQ==?= <jerome@ceriz.fr>
Date: Tue, 21 Jun 2011 00:16:22 +0200
To: John Levine <johnl@iecc.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

2011/6/20 John Levine <johnl@iecc.com>:
> Hi. =C2=A0I'm the guy who wrote the CEAS paper on greylisting.

URL ?

> Greylisting is useful, but anyone who thinks it's a substitute for
> DNSBLs has never run a large mail system.

You're right, greylisting on a large system may not be efficient as it
won't block everything and will eat-up quite a lot of system
ressources. But it's a good start once basic protocol-checks have
already eliminated the 80% amount of bullshit sent from botnets.

My point is : combining server-side checks of different nature is
often enough to avoid the use of RBLs and still provide a goode
quality of service. It probably won't scale to comcast' or AOL' MXs
but it's way better than relying on an external authority for your
corporate or personnal mailserver.

--=20
J=C3=A9r=C3=B4me Nicolle


home help back first fref pref prev next nref lref last post