Jim Maul wrote:
Kelson wrote:
Matt Kettler wrote:
That said, some folks still hate it because you're using some (very
little) of their CPU and network to handle your spam.
Also, a large number of verifications (say, because someone has been
sending lots of spam with forged headers) looks suspiciously like a
dictionary attack.
Exactly. In effect what sender verification does is cause your server
to perform the dictionary attack instead of the spammer.
Say im a spammer. I send messages to [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], etc and see which ones are accepted to gather valid
addresses.
With sender verfication, spammer now sends messages to
[EMAIL PROTECTED] with a return address of [EMAIL PROTECTED],
[EMAIL PROTECTED], etc. Your server does the sender check to see if
[EMAIL PROTECTED] exists. Your server is doing the work for the spammer
now and looks exactly like a dictionary attack. This could (and does)
very easily get you onto several blacklists.
Sender verification? Not for me, thanks.
Generally a dictionary attach uses randon to addresses, not from
addresses. Sender verification works on the from address. And if I
didn't use sender verification it scould result in a bounce message to
the address that I would have verified and the bounce message is a far
words problem than sender verification.