On Thu, 19 Jul 2007, Dave Pooser wrote:

> Actually I've seen one C/R variant that addresses the backscatter C/R issue
> quite nicely; it dropped the suspected spam in a quarantine folder and
> issued an SMTP fakereject after DATA that included a link to a website where
> the sender could release the spam from quarantine. So no backscatter
> spamming innocent third parties, but you still get a chance for the sender
> to verify sending a message. The backend might be a little involved to set
> up, but the final system looked secure and easy to use.

This breaks as soon as it runs into an Exchange server. Microsoft, in
their infinitely great wisdom, "sanitizes" DSNs, removes the original
error text and replaces it with their 'PC' interpretation of the error
code. Thus Exchange LLusers[1] will not see the link and have
no chance to release their message.


[1] the 'LL' is pronounced in the Spanish style.

-- 
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to