Why do so few mail providers support Port 587?
just me
matt at snark.net
Fri Feb 25 23:10:52 UTC 2005
On Fri, 25 Feb 2005, Christopher X. Candreva wrote:
On Fri, 25 Feb 2005, just me wrote:
> What are you, stupid? The spammers have drone armies of machines
> with completely compromised operating systems. What makes you think
> that their mail credentials will be hard to obtain?
What are you, stupid ? Run a virus scanner on your mail relay so you don't
propogate any viruses.
That certainly solves the problem in question, preventing
compromised hosts from using their user's credentials to transmit
AUTHed spam through their configured smarthost.
No, wait, your comment is a total non sequitur.
While AUTHed spam from zombies will be easier to detect and block,
it is not the Magic Solution that many folks on this list are
presenting it as.
Most ISPs don't watch logs for the signs of abuse now, why would
they magically change their behavior and monitor logs if they
required auth? Just because there is more of an audit trail doesn't
mean that it will be used.
matt ghali
--matt at snark.net------------------------------------------<darwin><
The only thing necessary for the triumph
of evil is for good men to do nothing. - Edmund Burke
More information about the NANOG
mailing list