Marc Perkel wrote:


Jim Maul wrote:
Kelson wrote:
Matt Kettler wrote:
That said, some folks still hate it because you're using some (very
little) of their CPU and network to handle your spam.

Also, a large number of verifications (say, because someone has been sending lots of spam with forged headers) looks suspiciously like a dictionary attack.


Exactly. In effect what sender verification does is cause your server to perform the dictionary attack instead of the spammer.

Say im a spammer. I send messages to [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], etc and see which ones are accepted to gather valid addresses.

With sender verfication, spammer now sends messages to [EMAIL PROTECTED] with a return address of [EMAIL PROTECTED], [EMAIL PROTECTED], etc. Your server does the sender check to see if [EMAIL PROTECTED] exists. Your server is doing the work for the spammer now and looks exactly like a dictionary attack. This could (and does) very easily get you onto several blacklists.

Sender verification?  Not for me, thanks.



Generally a dictionary attach uses randon to addresses, not from addresses. Sender verification works on the from address.

Generally, yes. But that is not to say that it couldnt be done other ways. What i described above is a perfectly valid way for this to happen as well.

And if I didn't use sender verification it scould result in a bounce message to the address that I would have verified and the bounce message is a far words problem than sender verification.


If you do *recipient* verification as opposed to sender, why would there be any bounce message at all? reject unknown recipients at smtp time. Wheres the problem? All sender verification seems to do at this point is create load on your and other peoples servers, and provide a mechanism for spammers to have you do their work for them. Add to that the fact that the from is always almost forged and what good is it? Hardly seems worth it to me.

-Jim



Reply via email to