Jon Kyme wrote:
The technical considerations document has been available for some time
at:
http://www.ietf.org/internet-drafts/draft-crocker-spam-techconsider-02.tx
t
Please review the
document and post your comments, questions, concerns to the list.
Yakov
I'm sure I've made this point before:
the assertion that
"...there is no opportunity for software
control of spam in UA.o , because the software is
under the control of the originator. "
is too strong.
In the (not inconsiderable) case of a Webmail system there is
a clear opportunity for spam control. The software is NOT under the control
of the originator. Providers of (free) webmail systems should have their
attention drawn to their responsibilities in this area.
This assertion should be qualified. Perhaps "Except in cases where the UA
software is not under control of the originator (for instance in the case
of "Webmail" systems) ... In which case, a responsibility for spam control
(on egress) rests with the provider."
Just an additional point here - the webmail providers should account for
automated scripts and WebDAV tools (like HotMail) that exploit their
systems. Perhaps even not providing such tools should be recommended
(BCP area probably).
Yakov
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg