On Fri, Aug 29, 2003 at 01:11:02PM -0600, John Fenley wrote
From: "Bart Schaefer" <schaefer(_at_)brasslantern(_dot_)com>
How would Choicelist or a similar scheme handle mailing lists that use
VERPs? Specifically those where the VERP token is regenerated at every
list delivery and hence differs even for the same recipient? (I believe
Yahoo! Groups has this behavior, for example, though I haven't checked
recently.)
Just to clarify, were you talking about Variable Envelope Return Paths?
That is a dilema. On the one hand that sort of dynamic address creation has
valid uses, but on the other hand that makes it impossible to verify each
address (a requirement for creation of a choicelist entry).
In this sort of special case it may be necisary to add a Choicelist header
pointing an entry with a wildcard description of the sending addresses that
will be used (without a header address based lookup might fail), as well as
a mandatory authentication mechanism (without authentication a header would
allow anyone to specify unsecured ids). Then there would have to be some
sort of proof that the person creating the entry was authorised to use all
of those addresses.
I use an ISP whose blocking occurs after RCPT:, but before DATA:.
This precludes the use of X-Headers. I whitelist the rDNS of the
sending MTA. For instance, I subscribe to a Yahoo mailing list. The
line...
PIACCEPTTAIL grp.scd.yahoo.com
in my ruleset accepts email from machines whose rDNS ends in the string
grp.scd.yahoo.com
--
Walter Dnes <waltdnes(_at_)waltdnes(_dot_)org>
Email users are divided into two classes;
1) Those who have effective spam-blocking
2) Those who wish they did
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg