Thanks Matt for the analysis. I kind of thought that was going to be the
case, but since I had not heard anything in a while...

On an interesting related note, Habeas is still trying to push their stuff.

John T
eServices For You


> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:Declude.JunkMail-
> [EMAIL PROTECTED] On Behalf Of Matt
> Sent: Monday, October 10, 2005 4:36 PM
> To: Declude.JunkMail@declude.com
> Subject: Re: [Declude.JunkMail] DomainKeys
> 
> John,
> 
> DomainKeys is designed to validate legitimate E-mail and can't be used
> to detect illegitimate E-mail any better than a SPAMDOMAINS test can.
> 
> The problem with crediting E-mail that has only been validated to have
> passed through such a server is that this fact in itself doesn't have
> enough merit to justify giving a single point back.  Yahoo for instance
> is known to have one of the biggest problems with hosting Phishing and
> AFF (Advance Fee Fraud) sites.
> 
>     Spamhaus: Yahoo major phishing site host
> 
> http://news.com.com/Spamhaus+Yahoo+major+phishing+site+host/2100-1029_3-
> 5850773.html
> 
> To make matters worse, recently Yahoo users themselves were phished for
> their account information, and in turn those hijacked accounts were used
> to send both porn spam and for other phishing attacks as well.
> 
>     Yahoo Users Get Phished
>     http://www.pcworld.com/news/article/0,aid,122707,00.asp
> 
> And the problems are so widespread that Yahoo's own free hosting site,
> Geocities, is being used to host countless HTML based redirection pages
> that the drug spammers are using in some of the largest spam campaigns
> around.
> 
> Yahoo isn't alone of course.  Last week's virus seeding events of the
> Sober.S worm were all done by way of AUTH hacked accounts on GMX.  When
> a provider has hundreds of thousands of accounts, and spammers have
> lists of many of those accounts, it is quite easy for the spammers to
> carry out a distributed AUTH hack where they guess just a few common
> passwords.  They could quickly amass thousands of accounts that they can
> use to relay E-mail through so that it looks legitimate.  Even if they
> required stronger passwords (which isn't a bad idea), I'm sure that
> there will come a day when these guys resort to just brute-force attacks
> to hack AUTH.  Be prepared for waves of spam and even some viruses to be
> spread through legitimate mail servers.
> 
> There is no value in DomainKeys, SenderID, or anything else that
> validates E-mail that comes from a shared server such as this.
> 
> Happy Monday!
> 
> Matt
> 
> 
> 
> 
> 
> John T (Lists) wrote:
> 
> >Good, bad, indifferent?
> >
> >Now that 3.0.5.5 is out and stable, any thoughts of including a test for
> >DomainKeys into Declude?
> >
> >John T
> >eServices For You
> >
> >
> >
> >---
> >This E-mail came from the Declude.JunkMail mailing list.  To
> >unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> >type "unsubscribe Declude.JunkMail".  The archives can be found
> >at http://www.mail-archive.com.
> >
> >
> >
> >
> ---
> This E-mail came from the Declude.JunkMail mailing list.  To
> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> type "unsubscribe Declude.JunkMail".  The archives can be found
> at http://www.mail-archive.com.

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.

Reply via email to