ietf-asrg
[Top] [All Lists]

Re: [Asrg] 0. General - anti-harvesting (was Inquiry about CallerID Verification)

2003-11-30 12:00:27
On Sun, Nov 30, 2003 at 03:43:08AM -0500, Hector Santos wrote

----- Original Message ----- 
From: "Yakov Shafranovich" <research(_at_)solidmatrix(_dot_)com>
To: "ASRG" <asrg(_at_)ietf(_dot_)org>

What happens if this is a legit user? You will end up sending an email
to him since at the DATA command, the MTA will accept the message? So
therefore, for those MTAs which answer 250 to all RCPT TOs and do
validation after the DATA command, your method of verification will
result in an extra email message to the user which itself can be
considered spam by the user (same argument as the C/R business).

arrrrrrrrrrrrrrrrrrrgh.  Good point.   I having looked into yet. Busy
writing mail.

  Ever heard of the expressions "deadly embrace" or "vicious circle" or
"mail loop" ?  Assume that machine A, which uses your system, tries to
send to machine B, which also uses your system.  What protection is
there to prevent such problems ?

  Secondly... what exactly does your system do that "identd" hasn't been
doing for the past 30 years ?

-- 
Walter Dnes <waltdnes(_at_)waltdnes(_dot_)org>
Email users are divided into two classes;
1) Those who have effective spam-blocking
2) Those who wish they did

_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg



<Prev in Thread] Current Thread [Next in Thread>