ietf-asrg
[Top] [All Lists]

RE: [Asrg] Trust relationships etc.

2005-07-21 04:14:12

Yes of course. But what's the point? 

Reputation schemes will only be effective if enough people implement
them, and it will still *not* solve a spamming zombied machine.
Authentication is not an answer - we must assume that all data sent from
a zombied machine can be falsified and that authentication details can
be stolen.

Spam filtering has to be done on a per-message basis.

Brian


-----Original Message-----
From: asrg-bounces(_at_)ietf(_dot_)org 
[mailto:asrg-bounces(_at_)ietf(_dot_)org] On Behalf Of
Jon Kyme
Sent: Thursday, July 21, 2005 11:23 AM
To: ASRG
Subject: RE: [Asrg] Trust relationships etc.

Brian Azzopardi wrote:
More sophisticated
implementations can feed the filter other events such as IPs, dollar 
amounts, appropriately processed time, etc.

And of course it's not hard to arange for reputation and authentication
data to be input to statistical filtering - this is easily done by
adding appropriate headers. This is a general mechanism for upstream
entities to provide input to downstream filtering.






_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg

  
This mail was checked for viruses by GFI MailSecurity. 
GFI also develops anti-spam software (GFI MailEssentials), a fax server (GFI 
FAXmaker), and network security and management software (GFI LANguard) - 
www.gfi.com 


_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg