-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Fri, Sep 19, 2003 at 12:38:18PM -0700, Robin Lynn Frank wrote: >Okay, look at this. [EMAIL PROTECTED] has his >email address spoofed by a spammer who sends out a million pieces of spam. Of >that number 50,000 recipients are using some form of C/R. >[EMAIL PROTECTED] now gets 50,000 challenge messages in his >mailbox because of email he never sent.
At my domain, I get mail sent to any address. Spammers forge random addresses at my domain, and I get heaps of "responses" of various types. In three weeks I got over 5000 mailer daemon messages resulting from spam. In over a month, I got about 50 challenges resulting from spam. I got about the same number of poorly formatted bounce messages that didn't get filtered with the other 5000. I feel sorry for [EMAIL PROTECTED] and his 50,000 challenges. I feel even more sorry about the 5 million bounce messages (wait, the spammer only sent 1 million spams; nevermind). In any case, credit where credit is due! C/R is not the big problem here. It may get there as its prevalence increases. In the meantime bad bounces and bad challenges are the result of the same problem: no authentication of the sender. I think of this as a backed up sewer. I put a plug over the drain in my basement so that the sewage doesn't get in. The problem is, that means everyone else in town gets a little more sewage. I wish I had a better way, but I don't feel obligated to let that crap in. - -- Kyle Hasselbacher Old age and treachery will overcome [EMAIL PROTECTED] youth and skill every time. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE/a2aY10sofiqUxIQRAvZaAKCD5mjobtdIP2Z9h4wCVKrYTDCp+ACfWjuR tE4uIy71DyyItXIBR4UbIYI= =fx20 -----END PGP SIGNATURE----- _____________________________________________ tmda-users mailing list ([EMAIL PROTECTED]) http://tmda.net/lists/listinfo/tmda-users
