On Sun, 14 Aug 2016, at 01:14 AM, John R Levine wrote:
> Maybe it's just me, but if I were running a free mail service, I would
> make it harder for random strangers to sign up and send mail
> like this.

Interesting, do tell us what you would do. Because this is what
happened:
 1. You signed up for a new FastMail account. In doing so you completed
    the Google CAPTCHA and were assessed by eHawk[1] risk analysis which
    did not find this signup suspicious.
 2. You then verified an SMS number. Getting one SMS number is easy.
    Getting a large number though is expensive relative to the gain you
    are likely to achieve from sending spam.
 3. You sent a single uniquely written message via our web interface.
    This was spam-scanned going out and unsurprisingly passed (your own
    incoming spam filtering also found it unremarkable I notice from the
    headers). Trial accounts are of course rate limited heavily in
    addition to outgoing spam scanning.
So I'm curious: what else would you do, as a hosted mailbox service, to
stop *a single spam message* from ever being sent successfully by a
spammer from a FastMail account to (say) a Gmail account that the
spammer also controls, so he or she can then use that message in a DKIM
replay attack?

Regards,

Neil

Links:

  1. http://e-hawk.net/
_______________________________________________
mailop mailing list
[email protected]
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to