Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263766AbUDVBW2 (ORCPT ); Wed, 21 Apr 2004 21:22:28 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263772AbUDVBW2 (ORCPT ); Wed, 21 Apr 2004 21:22:28 -0400 Received: from TYO201.gate.nec.co.jp ([202.32.8.214]:7627 "EHLO TYO201.gate.nec.co.jp") by vger.kernel.org with ESMTP id S263766AbUDVBW0 (ORCPT ); Wed, 21 Apr 2004 21:22:26 -0400 To: Rik van Riel Cc: Matti Aarnio , Jan De Luyck , , Subject: Re: vger.kernel.org is listed by spamcop References: Reply-To: Miles Bader System-Type: i686-pc-linux-gnu Blat: Foop From: Miles Bader Date: 22 Apr 2004 10:22:00 +0900 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1003 Lines: 17 Rik van Riel writes: > I'm certain than vger got listed on spamcop due to linux-kernel > subscribers reporting to spamcop some of the spam that leaked onto > lkml, through Matti's strict filters. Does that mean that spamcop does no verification of user reports? I was under the impression that it's fairly easy to automatically check whether a particular host is an open-relay or not, so it would seem kind of irresponsible for spamcop not to do this if some people are relying on their lists to do blocking (even if there's a disclaimer saying not to do that, clearly people are ignorant or dumb, so why not play it safe?). -Miles -- P.S. All information contained in the above letter is false, for reasons of military security. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/