I'm seeing a number of spam bounces at OTRS, which means that some spammers are using the queue mails as source addresses, at least at the SMTP level. Restricting outgoing servers with SPF would protect servers using SPF from receiving that spam. Which IMHO is much more important than handling the backscatters :)
Platonides wrote:
I'm seeing a number of spam bounces at OTRS, which means that some spammers are using the queue mails as source addresses, at least at the SMTP level. Restricting outgoing servers with SPF would protect servers using SPF from receiving that spam. Which IMHO is much more important than handling the backscatters :)
If anything, I would recommend using DKIM (DomainKeys Identified Mail) rather than SPF. Please see http://www.dkim.org/
--Marcin
On Sat, Apr 12, 2008 at 5:06 PM, Marcin Cieslak saper@system.pl wrote:
If anything, I would recommend using DKIM (DomainKeys Identified Mail) rather than SPF. Please see http://www.dkim.org/
Their list of supporters is unimpressive:
http://www.dkim.org/deploy/supporters.html
I notice the absence of, for instance, Microsoft and Google. I know Gmail uses SPF; I don't know if it uses DKIM. The concept of DKIM seems like a better idea (public keys instead of enumerating IP addresses), but that's not helpful if it's not supported by major mail relays.
On Wed, Apr 09, 2008 at 10:41:11PM +0200, Platonides wrote:
I'm seeing a number of spam bounces at OTRS, which means that some spammers are using the queue mails as source addresses, at least at the SMTP level.
OT: I'm about to deply OTRS at my new gig (it's not *that* much better than RT, just enough better :-)...
What dimension did you choose to use Queues for when setting up yours? Or alternatively, do you have any good pointers to doco on how to decide that?
Cheers, -- jra
wikitech-l@lists.wikimedia.org