Justin Mason wrote:

> 
> Hey Matt --
> 
> fwiw, I find them pretty inoffensive in and of themselves; however, from a
> game-theory point of view, their effects are lousy.
> 
> This, and other methods that attempt to fight spam by validating an email
> address' validity, don't necessarily try to validate that the email was
> *sent* by that address; just that the address exists.

True.. I don't defend it as a particularly effective or valid method, but I also
am not bothered by empty connections checking to see if an address is 
deliverable.

Realistically, this is a very minor problem. Compared to the six-billion other
network abuse attempts I get here each week, these are very much in the noise.

It makes me wonder how closely such admins watch their systems. There's a lot
more worrisome stuff going on out there than this.

> As a result, it forces spammers to use valid From: and MAIL FROM addresses
> in their spam.  The easiest source for those, for a spammer, is the address
> list they're sending spam *to*.  As a result, the spam recipients now
> get not just the spam itself, but also the "blowback" -- bounces, C/R
> bounces, "you sent me a spam!" bounces etc.

Realistically, most spam I get seems to be using addresses that are already in
the spammer's database of "valid" email addresses. While I see a lot of viruses
using dictionary based MAIL FROM addresses, I see very little spam doing this.

So I don't think this really changes much about spam, aside from perhaps
encouraging spammers to clean their lists.

Reply via email to