Messaging Pipeline | Blog
Free Newsletter GlossaryContact UsAbout Us
One To One Collaboration Servers & Security Business


July 15, 2005
Sender ID Is Used By Spammers -- Duhhhhh!

MX Logix says that spammers will be the primary users of e-mail sender authentication schemes, such as SPF and Sender ID. Well, Duhhhhhh! Who ever thought it would be any different? Certainly not I! (See Weapons Of Spam Destruction and Depending On Sender ID Is Whistling In The Dark). Who else stands to benefit as much from getting their sending identity legitimized? It’s like asking who’ll be first in line at the business license window when a town imposes a licensing requirement on retail vendors: Used car salespeople! Who else would you expect? Well, maybe barristers, but . . .

Look, we can’t secure e-mail from spammers and virus attackers by some passive means that enables the sender to control the program. If we let teenagers license themselves to drive, we’d have a bad result, right? Sender ID and SPF leave it to the sender to legitimize their existence -- no one else is really in charge of anything but checking that existence, and that’s passive and voluntary as well.


Sender accreditation aficionados think they have the answer because they somehow vet the track record of the sender and legitimize the messages. But who’s to say that those companies will never be bought off by the spammers? Who doesn’t remember Jeff Skilling, Billie Sol Estes, Bernie Ebbers, Mike Millikin, and other legitimate thieves?


I’m more certain than ever that an active, aggressive program that shuts down the spam-spewing zombie PCs hanging on to ISP servers and enterprise networks is the only answer to spam. I’m also convinced that early virus outbreak detection schemes are the only way to stop viruses. All this chitty-chat about authenticating senders and accrediting them is just so much . . . well, you get my drift.

Posted by John Dickinson at 07:55 PM | Permalink

Comment on this blog entry



 


March 2006
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

Monthly Archives













Messaging Pipeline










Get the latest Messaging news, product info, and trends every week.



  Get The Messaging Pipeline Blog RSS Feed




Editorial and vendor perspectives








  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  


Editor's Picks
The Six Flavors Of Windows Vista
Microsoft plans to release a full six-pack of Vista versions, one for every taste. Which Vista will be right for you?

Hope is Not Enough When It Comes To Compliance

Three Ways To Authenticate E-Mail And Stop Spam

Wikis In The Workplace

Review: Google Desktop 3
MESSAGING PIPELINE MARKETPLACE (sponsored links)

Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.


Roaring Penguin's CanIt-PRO anti-spam solution offers customizable spam and virus control for enterprises, campuses and ISPs. Designed for the mail server, CanIt-PRO lets you stop spam on YOUR terms. Click for free price quote for your organization.


Use your Intranet to manage Software Licenses, plan for Windows XP/2000 upgrades, do Security Audits and more. Click to try and ask for our white paper - PC Management for the Internet Age.


Analysts at the Tolly Group put a leading Branch Office IT services solution to the test, measuring performance, security and data reliability. Download the results, detailed in this free report, now.


Whether you need temporary or permanent access to remote PCs, LogMeIn has your solution: LogMeIn IT Reach for automatic maintenance of remote and mobile systems, and LogMeIn Rescue for instant, web-based remote access without pre-installing software.






Sponsored Links:      
 |   |   |   |   |   | 
 |   |   |   | 
 |   |   |   |   | 
Messaging Pipeline  |   |   |   | 
 |   |   |   |   | 
© 2006 | MESSAGING PIPELINE All rights reserved. | |