-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I've been following this for a while now, and a potential mitigator of
the 3rd party bounce problem just occurred to me:
Don't bounce messages back to a site if the IP that submitted the
address fails SPF for that site. Just drop the bounce into /dev/null.
I would say don't accept it at all, but there may be any number of
reasons someone wants to submit an e-card from a public terminal or a
friend's house when they have an e-mail provider that supports strong
SPF checking.
- --
Daniel Taylor VP Operations Vocal Laboratories, Inc.
dtaylor(_at_)vocalabs(_dot_)com http://www.vocalabs.com/
(952)941-6580x203
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFGOOZg8/QSptFdBtURAolzAJ432TSTT+Sb6LxdFA5N/8Ftx/eYYwCfcktF
KTbs/ESlBuyL6qlb4po9krA=
=+G9B
-----END PGP SIGNATURE-----
-------------------------------------------
-----------------------------------------------------------------------
Sender Policy Framework: http://www.openspf.org/
Archives at http://archives.listbox.com/spf-discuss/current/
To unsubscribe, change your address, or temporarily deactivate your
subscription,
please go to http://v2.listbox.com/member/?list_id=735
Powered by Listbox: http://www.listbox.com