On Dec 4, 2009, at 1:18 AM, jdow wrote: > And JD, I don't see on your site what it "costs" people to get listed > on your DNS approval lists other than some tests and documentation. Is > it possible spammers simply submit some buttered up documentation, get > approved, and accept getting it knocked back off your lists rapidly as > a business "time" expense?
No, there's a lengthy application process and a lot of monitoring involved. I'd be happy to ask someone from the Certification team to join the list and explain further as soon as I can be certain they won't be harassed and insulted here. In the meantime I'll answer as well as I can, considering that I work on entirely different products at Return Path. > I note that JD is quite willing to discuss (and seemed to recommend) > a lowered default score. That seems quite reasonable. The current defaults for both the HABEAS and BSP rules were set long before Return Path operated either service, so we have no clue where they came from either. On Dec 4, 2009, at 9:08 AM, Charles Gregory wrote: > As soon as any whitelist service like 'returnpath' accepts a client, they > perform the following: > > 1) Review the client's address list - look for honeypot addresses. > If any are found, clearly the client has not vetted their list. Our staff doesn't review their list, but we do operate a great many honeypots of our own -- and we receive feeds of honeypot messages from ISPs and other data partners. So, spammers can't hide that way. We also get feeds of complaints, where users click "this is spam" in a partner ISP's webmail interface. Spammers can't hide that way, either. (You can see the results of much of this data at senderscore.org.) I saw some other interesting ideas in the conversation, but they all assume the accreditor is able to change messages or otherwise interrupt the sender's mailstream. We don't have that ability, and don't want to. They have to police themselves, or else they get kicked off the list. Simple, neh? On Dec 4, 2009, at 10:06 AM, Greg Troxel wrote: > Probably "SOI" should be entirely dropped. There's only one Safe list (which SA still calls Habeas.) In other words: no difference between the SOI and COI lists. Or at least, that's how it's supposed to be -- so Kris's results were somewhat surprising. On Dec 4, 2009, at 11:08 AM, Charles Gregory wrote: > By the by, I think I posted on this list a while ago on a similar question, > as to whether we could really trust *any* whitelists, as they simply made for > a *deliberate* target of botnet owners. No one made a fuss about it before, > but what about now? Maybe, once again, the flaw is in having a whitelisting > system that relies upon third party servers with unknown security. We're EXTREMELY concerned about this as well, and we've got a 24x7 operations staff keeping an eye on things. That's one of the reasons we charge money for the service: it lets us buy hardware and software and hire staff to keep it running smoothly, and securely. -- J.D. Falk <jdf...@returnpath.net> Return Path Inc