View Single Post
  #79   Report Post  
Old 01-12-2003, 02:17 PM
Martin Brown
 
Posts: n/a
Default OT. new antispam laws in the US

In message , martin
writes
On Sun, 30 Nov 2003 16:43:35 +0000, Jane Ransom
wrote:

In article , martin
writes

(4) some innocent victim of her bounces will formally complain to her
ISP about her spamming, eventually.

How will they distinguish between a bounce and an invalid address used
initially by the spammer?


They will see the spam coming from you, not the original sender.


Depends on how the bouncing is done. Anything I bounce goes back to the
address in the return path complete with all the spammers forged
headers. It is then up to the unfortunate on the receiving end to decode
them and complain about the forgery to the spammers ISP or more likely
the dumb sysop with the open mail relay (or his ISP).

If they also use bouncing, you will get it straight back.


Bounces of bounces are prevented by having a null return path to avoid
endless loops.

I contacted demon recently because of what people were saying on this
thread - their advice was . . . . continue bouncing.


but then again Demon thinks that spam can't be identified and tagged.

All that bouncing does is waste bandwidth and server resources.
Somebody in Demon deserves the sack.


Bouncing tells the sender (or whoever appears in the return-path) that
their mail could not be delivered. Blocked by local policy or no such
user.

Opinion in Demon and amongst Demon users is divided on the usefulness of
bouncing. It isn't ideal, but then neither is simulating a black hole.

Bouncing Swen for instance seems much preferable to accepting it and at
least alerts the owner of the infected PC to their problem.

Regards,
--
Martin Brown