Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
I signed up for the reports at http://postmaster.aol.com/tools/fbl.html Then whenever someone reports a message to AOL as spam that AOL thinks originated from the BLU mail server's ip address, AOL forwards a copy of the reported message, after stripping the reporting user's identity from the headers. Tom Metro wrote: > John Abreau wrote: >> But then AOL started stripping the offender's identity, so we >> were unable to determine who to unsubscribe. > > How are you receiving these notifications from AOL? As normal bounces > sent to the envelope sender address? > > >> The changes to Mailman that now send a separate copy to each >> subscriber were done to make it possible to unsubscribe the >> offenders. > > Other Mailman lists I'm on utilize Variable Envelope Return Paths > (VERP)[1] (as someone else mentioned), so I assume it is something > Mailman supports. > > VERP is a technique where each message is sent using a unique envelope > sender address that can be used to identify who the original recipient > was when a bounce occurs. There is no need to modify the RFC822 headers. > > Contact me off-list if you'd like help figuring this out. > > -Tom > > 1. http://cr.yp.to/proto/verp.txt > -- John Abreau IT Manager Zuken USA 238 Littleton Rd., Suite 100 Westford, MA 01886 T: 978-392-1777 F: 978-692-4725 M: 978-764-8934 E: John.Abreau-3flU0AWMlV4AvxtiuMwx3w at public.gmane.org W: www.zuken.com -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |