Beefy Boxes and Bandwidth Generously Provided by pair Networks
There's more than one way to do things

Re: Just Another Discussion of Spam

by BazB (Priest)
on Mar 17, 2005 at 21:18 UTC ( #440546=note: print w/replies, xml ) Need Help??

in reply to Just Another Discussion of Spam

There are a number of problems with your idea: the first one being that spammers regularly forge From: addresses.

SMTP does support VRFY (verify) and EXPN (expand) commands to check that a given account exists on a machine, however this has long since been disabled by most administrators (myself included) ever since spammers started abusing the system to identify and harvest valid accounts. Have a read of RFC2821 - SMTP

An alternative would be to try and send a test message to the accounts, but you'd be effectively spamming too.

Even if you could verify the existence of an address, would you really want to delete all messages from an email address that no longer exists?
I've got emails going back quite a few years, many of which were sent from email addresses I know are defunct after friends have changed ISP or webmail providers and so on.

Spam Assassin does a pretty good job of filtering spam - I'd recommend using that (or an alternative tool), rather than your fairly coarse criteria.



If the information in this post is inaccurate, or just plain wrong, don't just downvote - please post explaining what's wrong.
That way everyone learns.

Replies are listed 'Best First'.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://440546]
[davido]: I am not finding closing STDIN to be an adequate means of making getlogin return undef.
[Corion]: Maybe doing a double-fork (daemonizing) can make go that information away, but maybe not
[Corion]: But I think my knowledge of unix/Linux datastructures is several decades out of date, so I don't really know what information it keeps on processes
[oiskuu]: The useful bits that relate to your process can be found under /proc/self. What information are you thinking of? Tty name?
[tye]: I just daemonized and getlogin() still knew who I had been.

How do I use this? | Other CB clients
Other Users?
Others exploiting the Monastery: (8)
As of 2017-06-23 19:32 GMT
Find Nodes?
    Voting Booth?
    How many monitors do you use while coding?

    Results (554 votes). Check out past polls.