also sprach Paul Johnson <firstname.lastname@example.org> [2005.06.19.1544 +0200]: > So punish them specifically. There are blackholes that do that. > bl.spamcop.net, sbl.spamhaus.org, xbl.spamhaus.org and bl.ursine.ca > all do that. And then they just hang up and dial in again to get a new IP. > You need to take into account false positives as well when you're > thinking about effectiveness. If false positives are greater than > zero, effectiveness is near-zero. You need to make assumptions, and mine are that people send mail according to the accepted infrastructure, which is to use smarthosts. > > For what it's worth: how do you know they don't intercept the > > mail that your mail spool then sends out? > > Eventually you get a bounce with the routing headers and you see > a mystery hop through your ISP. Who says they need to add headers? -- Please do not send copies of list mail to me; I read the list! .''`. martin f. krafft <email@example.com> : :' : proud Debian developer, admin, user, and author `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver! may the bluebird of happiness twiddle your bits.
Description: Digital signature