On Thu, 24 Jul 2008 16:32:13, Scott Kitterman wrote
You appear to have missed the next step where spammers scrape Arthur's list mail address from the mailing list archives and use it as the Mail From
address in spam they send to him.

That won't work because Arthur can't send any messages to himself unless he puts his own domain or email on the whitelist. Command mails from/to yourself are DISCARDED unless they are sent with SASL authentication.

What you could do on the other hand is use the list's domain as a forged sender. However, at this stage no spam I get is doing this which is why I ignored this case for 0.1.0. (Besides, I don't think of Postwhite as a magic stick, more another brick in the wall. For me, it cuts SPAMs down from 10 per day to 1 per week at this point.)

DKIM can't be added to a policy server by design. SPF on the other hand is doable. And it should do the trick because Postwhite only makes sense if you subscribe to a digest that comes from the list owner and not from the original sender. (Postwhite by design is worthless if you subscribe to a mailinglist's "individual mails" instead of a digest.)

In addition, the client_name or reverse_client_name could be recorded along with the whitelist entry to kick forged mails sent via another MTA. The only flipside to this is that should the list owner for whatever reason change the MTA, the whitelist would no longer deliver. The same, however, is true if the list changes its domain. A weekly automatic status message which lists these cases could at least alert the user that he might have missed someting. Good thing about mailing lists - they all have archives.

Thanks for your thoughts, more, please :-)

PS:
I'll be offline till Tuesday.

Reply via email to