On Wed, 07 May 1997 17:51:37 -0400 Brad Knowles <[log in to unmask]> said:
> Let them flame away. It has been my experience that those who flame
>AOL have never had to deal with a system anywhere *near* 1/10th the size
>of what we have, where a difference in scale typically results in a
>difference in kind.
*sigh* All right. How much SMTP mail did AOL deliver yesterday? L-Soft
made 4,143,362 deliveries yesterday (below average). I imagine that AOL
delivered well over 41,433,620 SMTP messages in that time frame, or you
would not have applied this remark to me.
> If they think they can do any better (yourself included), let them
>come here and prove it.
As a matter of fact, yes, I do think I could do better than your
sendmail-based setup! You would actually keep your current sendmail setup
but route all your outgoing mail through a redundant LSMTP configuration
(ideally a VMS cluster with shared redundant storage and automatic
failover, so that you can blow up any one of the box and continue
uninterrupted). Likewise, these servers could collect your incoming mail
and route it to your unix systems at a pace which you would be able to
control. This would allow you to operate your sendmail systems in the
most efficient manner, with little or no outbound queue, a controlled
number of concurrent processes, etc. So, you would be able to keep
development and custom code on unix where you want it, while dramatically
improving your performance and capacity. Was this a honest invitation or
just a figure of speech? If you are serious, please send us your
technical requirements and we will take it on from there.
> The response I've gotten from AOL users so far has been exceedingly
>positive,
Let me get this straight. You have observed that a lot of spammers used
source routes in the MAIL FROM: field. You then started rejecting this
mail and your users have been very happy. I don't doubt this. What is
going to happen though is that the spammers will get a clue, if not
tomorrow then next week or next month, and they will stop sending mail
with source routed MAIL FROM:, since it does not get there, and instead
use a % hack, the hostname of some random cisco somewhere in the net
(that would work wonders on your sendmail queues!), or why bother, just
MAIL FROM:<>. Your users will get the spam again and you will be back to
the drawing board. So, this is a temporary hack that will buy you some
amount of temporary relief until the spammers get smarter. Why didn't you
say so from the beginning? I still don't agree with the approach, but
this at least makes some measure of sense. Definitely more than just
stating that source routes are intrinsically evil and need to be
exterminated.
> I believe that you'll find beleaguered SysAdmins the world over that
>will feel the same way we do,
I am not disputing your right to refuse to process illegitimate messages.
We do this as well, and frankly I don't know where you got the notion
that I do not have to deal with spammers on a daily basis and have no
idea how mean they can be and so on. I am only disputing the wisdom of
rejecting perfectly legitimate messages (which have 2-3 recipients and
are thus clearly not spam) on the basis that the MAIL FROM: field looks
like what the current version of a popular spam program generates,
especially since there will be a new version of the spam program soon to
correct this "problem".
Eric
|