On Fri, Feb 16, 2018 at 8:58 PM, John Levine <jo...@taugh.com> wrote: > In article <32db9480-1666-d007-4d83-976d891e2...@linuxmagic.com> you write: >>> It's not really wise to use non-obfuscated return paths when using >>> VERP. If it's easily decodable, a goofball could spin up fake ones to >>> try to get 'em logged as legitimate bounces and inhibit future >>> delivery of certain messages to certain recipients. Is it >>> common/likely? > > That seems quite a stretch. Has it ever happened in the history of the > Internet?
I don't think it has and I never claimed as such. I think that's a bit unfair, making a sort of straw man argument in response. I am saying that I think it's unwise to put what amounts to subscriber-level PII or basically clear identifiers in the Return Path/MFROM, if mail back to that address is interpreted as an indication that an action should be taken (like logging a bounce and potentially stopping future mail to that recipient). It's an open slot where an external actor could insert something to cause actions beyond the expected ones. That counts as a security concern in my book. Yes, it is personally reasonable that different people will have different takes on the level of concern associated with that potential risk. Regards, Al Iverson -- al iverson // wombatmail // miami http://www.aliverson.com http://www.spamresource.com _______________________________________________ mailop mailing list mailop@mailop.org https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop