Alex wrote:
>> Anyone can add a Habeas header.  At best, it means they've got an outdated
>> configuration; at worst, it means they're spammers trying to get past
>> filters.
>>
>> https://senderscore.org/lookup.php?lookup=208.85.50.30 reveals that the
>> 208.85.50.30 is not currently accredited under the "Return Path Safe"
>> program criteria, which used to be Habeas before Return Path borged 'em.
>>     
>
> Thanks for the info. You would think with so many smart people behind
> the development of habeas that it wouldn't so easily be defeated.
> Isn't SPF and DKIM essentially as easily defeated?
>   

I think the point is that the Habeas headers are no longer used (because
they were too easy to fake).  The new Return Path system is now IP
based.  So any email that has a Habeas header was either created by a
previous Habeas customer who has not updated their configuration, or a
spammer trying to take advantage of outdated spam blocking setups that
check for the old Habeas headers.

The current Return Path, SPF, and DKIM are not easily defeated (of
course SPF must be configured properly to be useful).

> I believe they all need full participation for them to be effective?
>   

That depends on your definition of "effective".  Each of these methods
provides the recipient a way of determining the legitimacy of an email. 
If the sender is using one or more of these on his outgoing emails, the
recipient will be able to determine whether the email really came from
the sender (SPF & DKIM) and whether the sender is trusted not to send
spam (Return Path).  I'm not sure about Return Path, but SPF and DKIM
will be used by default in SA if the relevant Perl modules are installed.

-- 
Bowie

Reply via email to