Regarding DMCA vs. Spam by Bob Liu
While much hoopla is made about Virginia’s anti-spam law and statistics are bantered about regarding the inordinate amount of fraudulent spam, we should not
loose sight of the real problem in spam. That problem
is the unauthorized use of a person’s property.
Storage space provided by an Internet service provider
is rental property — similar to that of a storage
locker in a mini-warehouse. That space belongs to the
customer paying the storage fee, not businesses —
legitimate or fraudulent — that want to occupy that
storage space with their advertising.
Fifty legitimate businesses spamming at one email per day has the same
effect as one fraudulent spammer sending 50 emails per day. Opt-in — email marketing with permission — is the only ethical method of email marketing and that’s the legislation spam victims across America should be seeking, along with a private right of action so we can have a million-person army going after the spammers.
— Bruce Miller, www.AboutSpam.com, Seattle, Wash.
Just wanted to share a tidbit with you. In your article you noted that Hello Bob, Ah…you seem to have more of a head on your shoulders than most. Here’s a couple of comments I hope are useful.
you didn’t know why sendmail allows you to “change” the FROM: field. In
short, it doesn’t.
It is set once when the email session is set up but there is almost no way to verify it. If my mail program connects to your mail server and says (for the FROM: field) I’m bliu@jupitermedia.com, your email server cannot easily say that I am not since there is no
password verification — and due to the way email works currently, there cannot be.
Your article also, I feel, unfairly pointed the finger at sendmail. Sendmail is one flaw, sure. But the flaw isn’t sendmail — it’s the email specification. These same flaws exist in Postfix, Microsoft Exchange Server and every other MTA
To note another point, if you disable message-bouncing, how will your mom
know she misspelled your email address and you don’t know that she wants you at dinner at 6 instead of 7? 🙂
Otherwise, great article for getting the clueless masses a step further into the email discussion.
— Tom Allen, Systems Administrator
From someone who spends a good deal of her day reading spam related articles (I rep SpamSubtract from interMute), I just wanted to say how refreshing it was to read your article. It was good to see someone questioning what the legislature and the big three are saying and doing instead of just regurgitating what they put out.
I just wanted to say I enjoyed your article.
Thank you,
— Lisa Dilg, PerkettPR for interMute
…All that effort put into “securing” relays and proxies doesn’t stop the spam. I’d say it’s time for some good old contrarian thinking.
If going against the spammers is failing — and it is — then try going with them … see where that might lead. How would you do that? One way would be to figure out how the spammers look for open relays and open proxies to abuse and to give false results to the spammers. You can’t falsify the results of the open relays … so the only option is to falsify the results of secure servers. A true result is “we don’t relay” so a false result would have to be “we do relay.” Let’s see how that would go and see if it would work.
It’s pretty easy to find out how spammers find open relays. There’s only one way: look for them — same as anti-spammers used to do…same as some of those perhaps still do. The spammers attempt to send an email message to themselves through some list of IPs.
that IP as being an open relay; he plans to soon send spam through it if he needs a new open relay. And why was he looking if he didn’t?
— Brad Spencer, anti-spam advocate