David Legg ha scritto:
Norman Maurer wrote:
The only thing you can do against this is to use a SPF entry
( www.openspf.org ) and hope the remote mailserver use SPF.

Not quite the only thing ;-)

You could implement VERP! [1]

Essentially, if your system allocated unique return addresses to every email it issued then it could easily distinguish between truly bounced messages and spam messages pretending to be bounce messages or messages legitimately bounced but only as a result of a badly addressed initial spam message.

I think this would be much more effective than SPF which relies on everybody correctly implementing it for it to be effective. I read recently [2] that even a large organization like paypal mucked up their SPF entries leading to people being prevented from subscribing.

Regards,
David Legg


[1] http://cr.yp.to/proto/verp.txt
[2] http://mail.python.org/pipermail/python-list/2007-September/456167.html

This is not enough, anyway. You will also have to recognize incoming messages destinated to non VERPed email addresses as delivery notifications to remove them.

Furthermore if people uses multiple SMTP servers to send messages out then you will loose the bounces to messages they sent via others SMTP servers not using VERP.

Unfortunately in SMTP there is no rule that the outgoing SMTP server have to be the same of the MX server for the sender domain.

If you can accept this issue then VERP is better.

Stefano


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to