Look I'm don't want to argue the fine points of this. Maillists seem to be able to function with this sort of checking without spammers getting in. So I would say that the mail headers are the key to this. If the "return-path" dosn't match the "sender", or if something is amiss in the "X-check" header, then drop the message.
The whole thing could probably be done with the current pgp keysservers. Just put in the X-check header, something that Joe can check with public keys.
You will never be able to stop mail bombs, or DOS attacks.
My original point was this type of software is starting to popup. Some are as crude as to put and encrypted string in the subject line, which both the sender and receiver can decode. Joe can just drop anything without the encrypted string in the subject line; and he can also decrypt the line, and see if he gets the email address of the "alleged sender". He can drop anything he wants.
If you don't like the idea, thats fine. But i would rather be in control of it as a user, rather than have some ISP's filter deciding things.
As far as LARTing joe for 50,000 responses, what do you do about "innocent joe" receiving a 50000 count mail bomb? of the claimed sender.
In reply to Re: Re: Re: Re: Re: (OT) Fighting spam
by zentara
in thread (OT) Fighting spam
by Aristotle
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |