In message <20140821215806.gx23...@harrier.slackbuilds.org>, 
/dev/rob0 <r...@gmx.co.uk> wrote:

>I wouldn't recommend this, because many spam zombies access the 
>sender/victim's MUA settings, and they spew to addresses in the 
>address book, AS the sender/victim.  But I'm sure you know this.

I do, and I do not think that the phenomenon you have described
renders the general idea of automated whitelist maintenance
entirely un-useful.  Certainly if the evil spammers manage to get
into the address books of any of my personal correspondants,
then (with automated whitelisting) they could then spoof those
people in order to spam me.  But I do think that this would be
more the exception than the rule, and also, in case it was not
already apparent, a "good" automated whitelist system should
include some sort of "revocation" feature, in order to allow
for exactly such unfortunate (but rare) possibilities (and others).

>To me, this sounds more like a policy service feature (or that it 
>should be, I mean.)  Check the SASL username and sender address, to 
>whitelist the recipient's reply.

That sounds about right to me.

>I don't know if any of the existing projects (such as cbpolicyd or 
>postfwd) can do this easily, but it shouldn't be hard to add.

So, nothing already exists along these lines?


Regards,
rfg


P.S.  There are certainly sites... mine included... that eschew the
complexity of SASL and find in utterly unnecessary and superfluous
in the limited local context.  (Trust, including the capability to
send outbound, is, in my local context, limited to 127.0.0.1 and
the RFC 1918 addresses.)

I only mention this to emphasize that an optimal solution... should
anyone be motivated to venture forth and create one... would not and
should not assume that local senders/recipients will be "logging in"
to the local mail server (e.g. via SASL).

Reply via email to