On Wed, Nov 04, 1998 at 11:04:09PM -0600, Peter J. Schoenster wrote:
> What is the policy on this? Am I being too cautious? I think not.
No, you are being completely reasonable. Subscription procedures
which do not confirm the legitimacy of a request make very easy
targets for spam/mailbomb-by-proxy attacks, and are used for this
on a daily basis -- so much so that they're starting to attract
as much attention from the anti-spam community as open mail relays.
That's one of the reasons the just-point-and-click-and-you're-subscribed
subscriptions are a *terrible* idea, not just a bad one. (Another is
that they disenfranchise anyone who has access to mail, but not the
web -- and that's a very large community, including people behind certain
kinds of firewalls, people connected by non-IP protocols, people on
low-bandwidth connections, and people in developing countries that
are just getting wired.)
Please stick to your path on this one: otherwise, the day will come
when someone abuses those mailing lists and at that point, the domains
involved will rapidly find themselves blacklisted -- and getting on
those lists is a lot easier than getting off.
---Rsk
Rich Kulawiec
[EMAIL PROTECTED]
____________________________________________________________________
--------------------------------------------------------------------
Join The Web Consultants Association : Register on our web site Now
Web Consultants Web Site : http://just4u.com/webconsultants
If you lose the instructions All subscription/unsubscribing can be done
directly from our website for all our lists.
---------------------------------------------------------------------