"Chris" <rebel(_at_)rebel(_dot_)com(_dot_)au> wrote:
Trojaned machines - by their nature authenticated
No, not actually. The authentication process is SMTP server to
server,
No when I say trojaned machine I mean someone places a trojan on my machine
and then sends email on my account
my server will of course authenticate the email as having come from me (and
itself) the server doesn't know my machine has been compromised.
I didn't send it, some spammer who took over my machine did.
That depends on your configuration. I don't store keys or passwords
anywhere Windoze can get hold of them.
Even for those who do, this makes detecting and blocking them easier,
since the ISP can filter its own email servers.
If "Blocklists" were to become viable in my opinion they would have to be
formalised
They are viable: they exist and are used. They aren't perfect, but
those who use them choose to do so anyway.
and again the argument arises that one mans spam is another mans erectile
enhancer
You shouldn't use a blocklist that you don't want to.
Just because someone personally won't accept any form of spam does not mean
the next person has to bow to their wishes.
The next person doesn't have to use my mailserver, he can buy service
from someone else or run his own.
this is effectivally censorship which I am totally against.
My toys, my rules.
Seth
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg