Thanks Matt for the analysis. I kind of thought that was going to be the case, but since I had not heard anything in a while...
On an interesting related note, Habeas is still trying to push their stuff. John T eServices For You > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:Declude.JunkMail- > [EMAIL PROTECTED] On Behalf Of Matt > Sent: Monday, October 10, 2005 4:36 PM > To: Declude.JunkMail@declude.com > Subject: Re: [Declude.JunkMail] DomainKeys > > John, > > DomainKeys is designed to validate legitimate E-mail and can't be used > to detect illegitimate E-mail any better than a SPAMDOMAINS test can. > > The problem with crediting E-mail that has only been validated to have > passed through such a server is that this fact in itself doesn't have > enough merit to justify giving a single point back. Yahoo for instance > is known to have one of the biggest problems with hosting Phishing and > AFF (Advance Fee Fraud) sites. > > Spamhaus: Yahoo major phishing site host > > http://news.com.com/Spamhaus+Yahoo+major+phishing+site+host/2100-1029_3- > 5850773.html > > To make matters worse, recently Yahoo users themselves were phished for > their account information, and in turn those hijacked accounts were used > to send both porn spam and for other phishing attacks as well. > > Yahoo Users Get Phished > http://www.pcworld.com/news/article/0,aid,122707,00.asp > > And the problems are so widespread that Yahoo's own free hosting site, > Geocities, is being used to host countless HTML based redirection pages > that the drug spammers are using in some of the largest spam campaigns > around. > > Yahoo isn't alone of course. Last week's virus seeding events of the > Sober.S worm were all done by way of AUTH hacked accounts on GMX. When > a provider has hundreds of thousands of accounts, and spammers have > lists of many of those accounts, it is quite easy for the spammers to > carry out a distributed AUTH hack where they guess just a few common > passwords. They could quickly amass thousands of accounts that they can > use to relay E-mail through so that it looks legitimate. Even if they > required stronger passwords (which isn't a bad idea), I'm sure that > there will come a day when these guys resort to just brute-force attacks > to hack AUTH. Be prepared for waves of spam and even some viruses to be > spread through legitimate mail servers. > > There is no value in DomainKeys, SenderID, or anything else that > validates E-mail that comes from a shared server such as this. > > Happy Monday! > > Matt > > > > > > John T (Lists) wrote: > > >Good, bad, indifferent? > > > >Now that 3.0.5.5 is out and stable, any thoughts of including a test for > >DomainKeys into Declude? > > > >John T > >eServices For You > > > > > > > >--- > >This E-mail came from the Declude.JunkMail mailing list. To > >unsubscribe, just send an E-mail to [EMAIL PROTECTED], and > >type "unsubscribe Declude.JunkMail". The archives can be found > >at http://www.mail-archive.com. > > > > > > > > > --- > This E-mail came from the Declude.JunkMail mailing list. To > unsubscribe, just send an E-mail to [EMAIL PROTECTED], and > type "unsubscribe Declude.JunkMail". The archives can be found > at http://www.mail-archive.com. --- This E-mail came from the Declude.JunkMail mailing list. To unsubscribe, just send an E-mail to [EMAIL PROTECTED], and type "unsubscribe Declude.JunkMail". The archives can be found at http://www.mail-archive.com.