On Wed, Nov 04, 1998 at 11:04:09PM -0600, Peter J. Schoenster wrote:
> What is the policy on this?  Am I being too cautious? I think not.  

No, you are being completely reasonable.  Subscription procedures
which do not confirm the legitimacy of a request make very easy
targets for spam/mailbomb-by-proxy attacks, and are used for this
on a daily basis -- so much so that they're starting to attract
as much attention from the anti-spam community as open mail relays.

That's one of the reasons the just-point-and-click-and-you're-subscribed
subscriptions are a *terrible* idea, not just a bad one.  (Another is
that they disenfranchise anyone who has access to mail, but not the
web -- and that's a very large community, including people behind certain
kinds of firewalls, people connected by non-IP protocols, people on
low-bandwidth connections, and people in developing countries that
are just getting wired.)

Please stick to your path on this one: otherwise, the day will come
when someone abuses those mailing lists and at that point, the domains
involved will rapidly find themselves blacklisted -- and getting on
those lists is a lot easier than getting off.

---Rsk
Rich Kulawiec
[EMAIL PROTECTED]
____________________________________________________________________
--------------------------------------------------------------------
 Join The Web Consultants Association :  Register on our web site Now
Web Consultants Web Site : http://just4u.com/webconsultants
If you lose the instructions All subscription/unsubscribing can be done
directly from our website for all our lists.
---------------------------------------------------------------------

Reply via email to