Norman Maurer wrote:
The only thing you can do against this is to use a SPF entry
( www.openspf.org ) and hope the remote mailserver use SPF.



Not quite the only thing ;-)


You could implement VERP! [1]

Essentially, if your system allocated unique return addresses to every email it issued then it could easily distinguish between truly bounced messages and spam messages pretending to be bounce messages or messages legitimately bounced but only as a result of a badly addressed initial spam message.

I think this would be much more effective than SPF which relies on everybody correctly implementing it for it to be effective. I read recently [2] that even a large organization like paypal mucked up their SPF entries leading to people being prevented from subscribing.

Regards,
David Legg


[1] http://cr.yp.to/proto/verp.txt
[2] http://mail.python.org/pipermail/python-list/2007-September/456167.html

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to