-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Fri, Sep 19, 2003 at 12:38:18PM -0700, Robin Lynn Frank wrote:
>Okay, look at this.  [EMAIL PROTECTED] has his
>email address spoofed by a spammer who sends out a million pieces of spam.  Of 
>that number 50,000 recipients are using some form of C/R.  
>[EMAIL PROTECTED] now gets 50,000 challenge messages in his 
>mailbox because of email he never sent.

At my domain, I get mail sent to any address.  Spammers forge random
addresses at my domain, and I get heaps of "responses" of various types.

In three weeks I got over 5000 mailer daemon messages resulting from spam.

In over a month, I got about 50 challenges resulting from spam.  I got
about the same number of poorly formatted bounce messages that didn't get
filtered with the other 5000.

I feel sorry for [EMAIL PROTECTED] and his 50,000
challenges.  I feel even more sorry about the 5 million bounce messages
(wait, the spammer only sent 1 million spams; nevermind).

In any case, credit where credit is due!  C/R is not the big problem here.
It may get there as its prevalence increases.  In the meantime bad bounces
and bad challenges are the result of the same problem:  no authentication
of the sender.

I think of this as a backed up sewer.  I put a plug over the drain in my
basement so that the sewage doesn't get in.  The problem is, that means
everyone else in town gets a little more sewage.  I wish I had a better
way, but I don't feel obligated to let that crap in.
- -- 
Kyle Hasselbacher             Old age and treachery will overcome
[EMAIL PROTECTED]                   youth and skill every time.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE/a2aY10sofiqUxIQRAvZaAKCD5mjobtdIP2Z9h4wCVKrYTDCp+ACfWjuR
tE4uIy71DyyItXIBR4UbIYI=
=fx20
-----END PGP SIGNATURE-----
_____________________________________________
tmda-users mailing list ([EMAIL PROTECTED])
http://tmda.net/lists/listinfo/tmda-users

Reply via email to