Danny Angus wrote:

>>Have you read RFC 1939?  The mailbox name is "a string
>>identifying a mailbox
>>(required), which is of significance ONLY to the server."

I read it and I agree with below.  As far as a security risk I don't see 
how it's any more of a risk.... If someone is sniffing traffic, they 
know where you connected to and what username you sent anyhow (Unless 
the entire transmission is secure, which also doesn't create any higher 
security risk).  I'm truly open for discussion on this, I just currently 
don't see it.

> But that doesn't prevent the use of the whole address, however doing so
> would require changes to local delivery.

Could you setup user inboxes to include the domain on multidomain 
systems? Another cleaner, but more involved change would be to map
domains in user repositories either in subdirs or in naming conventions 
for the file.  I freely admit I don't understand the system near enough 
to know all the implications, but I'm slowly getting there.
>>Honestly, I'd love to can file system user
> There is consensus, I believe, in extending choice.

Precisely. Just because one person looks at it as a burdensome method 
does not mean it should be excluded as an option.

>>>otherwise the mail server returns a User Unknown
>>>message of some type.
>>Ah!  Gotcha.  You want to return a 550, but I believe that you
> it is better anti-spam practice not to indicate invalidity in a 550 message,
> James doesn't validate addresses at all,  [FAQ reference]

I understand that portion, what I'm looking for is another option to the 
"black-hole" method.  By accepting spam, spammers will continue to send 
(although the lucky user doesn't have to see it).  Granted, for the 
alternate method I bring up, there will be more overhead for each 
individual message (although I wouldn't imagine it's going to be much 
more than the overall black-hole method), but, by reporting back that 
the user doesn't exist, the spammer will stop trying to send AND given 
that the mappings are compared to sender address as well, I believe it 
becomes MUCH harder for spammers to emulate and bypass.
If To and From don't match they receive a 550 as Noel stated.  I also 
have a second motive for doing the comparison - tracking who is either 
selling names or has a security loophole in their site.  All the items I 
listed, used together, make for an excellent tracking system for users 
and admins alike.  Admin@trackedDomain can send to Admin@breachedDomain 
and say many of my users are complaining about receiving spam from the 
email they used on your site.

Me personally, I hate spam so much, I plan on creating a site to report 
sites that refuse to address the problem (pardon the pun 8).
> In fact James performs no pre-processing of mail during the SMTP transaction
> apart from checking the basic syntax of the SMTP conversation itself.

I'm not saying make it default behavior, just an optional processing step.

> The possibility of adding more complex behaviour to this element, and of
> adding virtual hosting to the whole mail system have been under discussion
> for at least a year but keep failing to reach concensus on any specific
> scheme, and in the meantime no commiter has taken the bull by the horns and
> implemented any stop-gap measures.
I'm studying the system now, I'm going to try to get a proposal/proof of 
concept coding done (not sure exactly when though 8).

     David Jenkins


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to