Keyserver spam example

MFPA expires2010 at ymail.com
Thu Jun 10 18:33:14 CEST 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi


On Thursday 10 June 2010 at 4:57:50 PM, in
<mid:201006101757.53020.joke at seiken.de>, Joke de Buhr wrote:


> One of the addresses of my key is totally unprotected
> against spam. Nothing is blocked or scanned there. And
> it doesn't get any spam at all.

Fair enough.



> As far as I know you cannot do a search like "2010" on
> keyserver webinterfaces to get recently created keys.

You get keys with "2010" in the user-id. About half of those returned
by pgp.mit.edu have a 2010 creation date...



> You do not sacrifice legitimate incoming mail because
> there is an RFC that clearly states mailservers do not
> operate from dynamic IP addresses. Therefore they can
> not be considered valid.

Plenty of people send mail using server software on their own
computer, particularly those who move around and connect to the
internet via a plethora of different ISPs and WiFi locations. That
doesn't make it "correct". But being sent from an RFC-ignorant server
does not make a message spam or illegitimate or invalid. It just makes
it slightly more suspect.

- --
Best regards

MFPA                    mailto:expires2010 at ymail.com

Pain is inevitable, but misery is optional.
-----BEGIN PGP SIGNATURE-----

iQCVAwUBTBET16ipC46tDG5pAQopSQQAizSSLXxshROsQRoY4tHFpzo/vTAlt55/
lAZVRyOMJuoxAXkAK30y6DZhTEwufclGKcvXLGXv/3ir/wjF1ovJhkRjeT37IUPz
JjOjXIFHaay+yyWV/mNyPunDWkUk57C3EePsjeMlHo4NkKCm77MjxAdcHZL2ipnH
dY45QC0iBsc=
=ldxc
-----END PGP SIGNATURE-----




More information about the Gnupg-users mailing list