Keyserver spam example
MFPA
expires2010 at ymail.com
Thu Jun 10 18:33:14 CEST 2010
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Hi
On Thursday 10 June 2010 at 4:57:50 PM, in
<mid:201006101757.53020.joke at seiken.de>, Joke de Buhr wrote:
> One of the addresses of my key is totally unprotected
> against spam. Nothing is blocked or scanned there. And
> it doesn't get any spam at all.
Fair enough.
> As far as I know you cannot do a search like "2010" on
> keyserver webinterfaces to get recently created keys.
You get keys with "2010" in the user-id. About half of those returned
by pgp.mit.edu have a 2010 creation date...
> You do not sacrifice legitimate incoming mail because
> there is an RFC that clearly states mailservers do not
> operate from dynamic IP addresses. Therefore they can
> not be considered valid.
Plenty of people send mail using server software on their own
computer, particularly those who move around and connect to the
internet via a plethora of different ISPs and WiFi locations. That
doesn't make it "correct". But being sent from an RFC-ignorant server
does not make a message spam or illegitimate or invalid. It just makes
it slightly more suspect.
- --
Best regards
MFPA mailto:expires2010 at ymail.com
Pain is inevitable, but misery is optional.
-----BEGIN PGP SIGNATURE-----
iQCVAwUBTBET16ipC46tDG5pAQopSQQAizSSLXxshROsQRoY4tHFpzo/vTAlt55/
lAZVRyOMJuoxAXkAK30y6DZhTEwufclGKcvXLGXv/3ir/wjF1ovJhkRjeT37IUPz
JjOjXIFHaay+yyWV/mNyPunDWkUk57C3EePsjeMlHo4NkKCm77MjxAdcHZL2ipnH
dY45QC0iBsc=
=ldxc
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list