On Wed, Jun 18, 2003 at 06:18:06AM +1000, Peter Kiem wrote:
> OK that is fine but a large majority of spam is sent from dynamic IP
> addresses which are NOT open relays but just used to spew out millions of
> emails to the rest of us poor suckers.
> 
In other words, ALL the ISP's you peer with are not doing what they need
to do to keep spammers from using their access points to attack,
penetrate and use other systems as mail relays.

Gee - what would happen if you actually verified who a person was before
giving them an account?

ISP's don't do anything to prevent thousands of
spammers from getting access to internet, and then they claim they have to
shut down normal rfc-correct practices because the spammers are causing
you so much pain.

They should just stop peering with any ISP who doesn't verify the real
identity of their customers before giving them an account.

The real reason spammers exist is the ISP's. The ISP's are so worried
about getting every possible penny out of every possible client that
they won't even use the identity verification tools ALREADY AVAILABLE
from the credit card services to keep the spammers off the net.

How about re-writing your peering arrangements so that any ISP who fails
to do proper identity checks and cross checks against a database of
spammers loses their peering privileges.  

This would, of course, cost money, so it won't happen.  

It would also, of course, mean most of the third world ISP's would lose
peering for a while, until they got their houses in order.

heh - So would AOL, I think.  :-)

Spammers would then (as they are already doing), pay other people to let
them use their accounts to send spam with and those folks would also go
in the database.  Too bad.


> Those of us that have to process THOUSANDS of emails every day know the
> VALUE of rejected dynamic address SMTP for cutting down the junk.

I agree it is a practical approach to reducing spam, but it is pretty
much contrary to the original design and intent of the Internet.

Switch to Bayesian filtering.  Much smarter.  You can even use it on 
the customer sign up process.  :-)   You can use Bayesian filters on
just about anything.  (Its similar, in a crude way, to the tools used 
to perform speech recognition.)

Then once you've identified a customer as a repeat spammer, I think
its very appropriate to use a tactical nuke.  ;-)

-- 
Jeff Kinz, Open-PC, Emergent Research,  Hudson, MA.  [EMAIL PROTECTED]
copyright 2003.  Use is restricted. Any use is an 
acceptance of the offer at http://www.kinz.org/policy.html.
Don't forget to change your password often.


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to