I was referring to mail being relayed through the internet. As soon as it leaves your network, its out of your control, so whether your ISP or the receiver's ISP / corporate policy does it is a moot point.DFantom said:That should be up to the mail admin, not the ISP.
Now you can very easily set up sane rates. Spammers work on the shotgun effect: try and broadcast to as many as possible, as fast as you can. You can now easily have it tarpitted, so that as soon as some IP address is sending its 20th email in the past 5 seconds (just random numbers), you start decreasing the throughput with which you handle his email requests. It should be fairly easy to come up with a break-through point where it minimally affects the user, but severely pisses off the spammer.Hell yeah it will. But As I stated in my earlier posts if they come down hard on the offenders then it will cause them to be avoid by spammers. Anyway whats stopping spammers just using the WBS mail server now? And when that gets blocked?
I would love to know where you dragged that number from. I agree the majority of users will be uneffected by I think you would find the amount of effected users far higher. I'm thinking of people who run there own servers, monitor mail servers, pay for a special mail server setup (i.e. a system which archives all mail, or digitally signs all mail automatically), the WBS resellers who run their own mail servers and all their clients and so on. Yes I agree that at the end of the day the bulk can work around it. My issue is why should they have to?
Let's call it an informed thumbsuck. As I said, the biggest majority of ISP users are plain vanilla dial-up users, with very simple email needs. They just need to point the MUA at something, and they mostly shouldn't be running their own mail server anyway. Corporates should have a mail hub that focuses all their mail on one server, after which it is trivial to add the iBurst SMTP server as a smarthost. You really have to have a special need to not be able to use their relay server.
My question, once again, is: besides the way that they handled it (which I *agree* could have been MUCH better), what impact does it have on any normal customer/family member/friend who simply has to change their software once?Agreed when choosing iBurst personally and recommending to friends/family/clients it wasn't a factor since it wasn't an issue. Now that it is blocked and the way WBS has handled this it is an issue and it is a factor in cancelling iBursts and not recommending it to anyone else.
It's not difficult, but why with very little warning should this be shoved onto people to do.
Just search through slashdot -- there are numerous big ISPs mentioned there. In fact, the practice of blocking port 25 has been discussed /ad nauseum/ there, and may provide insight for those not convinced yetCare to name one? I have never seen this practise on an major ISP level, ANYWHERE. I've seen it done in other places before, mostly on a corporate level. But NEVER an "major" ISP level.
A selected few to get you started:
- They Blocked My SMTP, Now What? -- Advice for everyone stuck with the current setup
- ISP Responsibility in Fight Against Spam
- FTC Recommends ISPs Disconnect Spam Zombies
- More MyDoom Gloom -- Starts out with Optus (a HUGE .au ISP) blocking port 25, albeit selectively
See my reasoning above. The other nice thing that this catches are all these new viruses which start their own SMTP mailing -- instant fix to another scourge. And tarpitting them at the SMTP server will also catch variants that will try to relay the message.How so? It seems now all the spammers need do is use the WBS mail servers. Which in turn slows them down, makes them less reliable, and gets them blocked. Seems to me that this is a bad move.
The thing is, now ISPs can monitor volumes of email sent by customer; this will provide them with a stick with which to beat clues into the clueless. And again, I'm not saying anything about iBurst or any other provider's previous actions; I'm assuming a good, responsible ISP in all my posts.
This unfortunately falls more into good customer relations and management, rather than the problem of blocking port 25 as such. They have a responsibility towards their customers to maintain a stable network, and not effect changes that will make life difficult for everyone.In my case I have to change 30 domain names records for this. I need to test all the records before appling them. I need to generate the SPF information. I need to hope that WBS does not change there IP addresses and mail server domain names without prior warning or it will break the SPF again.
The change itself isn't hard, it's everything else that goes with it thats time consuming and hard.