Norman Maurer wrote:
The only thing you can do against this is to use a SPF entry
( www.openspf.org ) and hope the remote mailserver use SPF.
Not quite the only thing ;-)
You could implement VERP! [1]
Essentially, if your system allocated unique return addresses to every
email it issued then it could easily distinguish between truly bounced
messages and spam messages pretending to be bounce messages or messages
legitimately bounced but only as a result of a badly addressed initial
spam message.
I think this would be much more effective than SPF which relies on
everybody correctly implementing it for it to be effective. I read
recently [2] that even a large organization like paypal mucked up their
SPF entries leading to people being prevented from subscribing.
Regards,
David Legg
[1] http://cr.yp.to/proto/verp.txt
[2] http://mail.python.org/pipermail/python-list/2007-September/456167.html
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]