No, this is different. The way these DNS-based blacklists work is that
if the sending IP is listed in the database (because it's a known
spammer/open relay) then DNS lookups succeeds, so the MTA will reject
the mail. If the DNS lookup fails, it implies that the IP address is
*not* in the database, and thus the email is accepted.
Maybe some broken MTA's will reject the message on DNS *transaction
failure* (due to an intermittent network fault or DNS server failure),
but that's not the same as a lookup failure (host not found, but DNS
server responded).
All this is separate from normal reverse DNS lookups of the sending
IP (where many MTA's are configured to reject mail from hosts which
don't resolve).
Regards,
Richard....
Permanent: rgooch@atnf.csiro.au
Current: rgooch@ras.ucalgary.ca
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/