There is of course the other part that various freemails just might not 
appreciate their customers sharing passwords  with a third party, like say an 
esp

--srs

On 24-Mar-2016, at 8:13 PM, G. Miliotis <corf...@elementality.org> wrote:

>> On 24-Mar-2016, at 7:27 PM, G. Miliotis<corf...@elementality.org>  wrote:
>> 
>> Now if you are suggesting that they will see multiple different logins on 
>> their SMTP from the same IP address, yes they will. If they consider this an 
>> attempt at spamming, i.e. I've harvested logins via phishing and am sending 
>> spam, maybe they should improve their filters.
> 
>> On 24/3/2016 16:09, Suresh Ramasubramanian wrote:
>> If you are confident that all your customers doing this are low volume and 
>> legit, and none of them will ever be compromised, be my guest
>> 
>> --srs
> 
> A customer's account being compromised and sending spam will blacklist you 
> even via normal email operations, so I don't see any increased risk there. 
> We're supposed to have egress filtering anyway, right? Just set lower rate 
> limits for freemail accounts.
> 
> Lets compare a common scenario to this as a mental exercise. One of my 
> "normal" non-freemail customers gets compromised and starts sending spam to 
> freemail.com. Freemail.com bans my IP via their incoming filters, starts 
> 5xx'ing me. I see this, locate the customer, fix the problem and begin the 
> process of contacting freemail.com to get unbanned. How can I positively 
> PROVE to them that the compromise has gone away? They'll just have to take my 
> word for it. Probability of unban: zero, until enough time has passed for 
> filters to get wise to the fix. Which could be forever if you're a low volume 
> sender anyway (true story).
> 
> Conversely, in the case that a specific SMTP AUTH user sending from my server 
> getting compromised, they will ban me again, 5xx starts. I will notice 
> immediately and fix the problem with the client. Then, when I go to 
> freemail.com to get unbanned they will know the specific customer involved. 
> They will have a measure of how valid my claims that the issue is fixed are. 
> They have logs to check the account credentials were changed, they have a 
> contact and hey, it's a CUSTOMER or theirs telling them I've fixed it. Much 
> easier to believe. Much easier to unblock. At least in a reasonable world.
> 
> In addition, they can take escalating measures against this particular user 
> (rather than against all my customers) in the first place by disabling SMTP 
> auth for the account instead of outright banning the whole IP address. Then 
> the rest of THEIR CUSTOMERS using my server would not be impacted. For 
> example, Yahoo! does something similar by rate-limiting IPs rather than 
> outright banning them when their customers complain. So I just turn off 
> sending to Yahoo for 4 hours while I fix the customer and we're back in 
> business automagically. I may get 4 hours of queues and impact all Yahoo! 
> recipients, but at least I don't need to prove I'm not an elephant to a 
> support person that only has two buttons: "eject" and "patronize".
> 
> Sorry, this got rather long.
> 
> --GM

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to