Dňa 5. decembra 2022 21:57:42 UTC používateľ "Gellner, Oliver via mailop" 
<mailop@mailop.org> napísal:

>The reason for this might be that most report addresses are parsed by scripts, 
>not read by humans, and the scripts aren’t subsceptible to buy the advertised 
>products. The spammers would need to create spam content in valid DMARC or 
>TLSRPT formats, ie insert the spam messages as values into the XML / JSON 
>tags, so that eventually a human reads it. This sounds like a lot of extra 
>work with little benefit.

Perhaps, but i am (my MTA) getting SPAMs to Mozilla MID like addresses
for years. Recently i start to get SPAMs to names not common in our country
(our country TLD), including English service accounts (invoice, or so) and even
to our XMPP's JIDs (which newer had email account), etc, etc. In other words,
by my experiences, the spammers are able to try anything what at least
looks as valid email address, scraped from anywhere... Thus why not try
those report addresses? I do not complain, i am only surprised...

I will guess, that multiple (many?) small/personal MTAs will have these
reports enabled, but have parsing triggered manualy, as there are multiple
tools for that, eg. on github...

>To test the script with other TLS reports you can try to get the mailservers 
>of mail.ru, Socketlabs or companies that use MDaemon to send emails to you....

I am not as interested in these reports. After i will get some other than from
google and it fails to parse, it will wait in queue for some days, thus i can
fix/improve my script, as i did with DMARC reports, which i initaly did on
RFC base and then i lower my (or script's) expectations. Now it works
and i do not remember when it fails last -- many months ago.

regards


-- 
Slavko
https://www.slavino.sk/
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to