>> I have some fairly heavily forged domains, and on a bad day I see >> upwards of 300,000 connections from bounces, "validation", and the >> like attacking the little BSD box under my desk where the MTA is. >> Gee, thanks a lot. > >Verification has nothing to do with bounces and mail bombs. You may >get some traffic from verification but you would need to separate >that out from the rest which is unrelated before you have a >meaningful statistic.
I have, it's meaningful. Verizon is the worst offender, but at least they put their attack hosts in a separate easy to block IP range. >> What planet have you been on? A few years back spam return addresses >> were typically complete fakes in nonexistent domains. Now they're >> picked out of the same victim lists as the targets. > >They have been doing that for ages. I run a hosting service and have >had that problem way before sender verification became in vogue. Definitely different planets. Bye. R's, John PS: >> YOU are responsible for the mail sent with your domain on it. Oh, OK. So when someone sends out mail with your forged return address saying "buy this worthless stock, then get your kiddy porn here", you will report directly to jail without complaining, right? _______________________________________________ email@example.com mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"