Browse Prior Art Database

Anti-Spam Spoofing From Server

IP.com Disclosure Number: IPCOM000031848D
Original Publication Date: 2004-Oct-14
Included in the Prior Art Database: 2004-Oct-14
Document File: 1 page(s) / 26K

Publishing Venue

IBM

Abstract

Server based "Message Undeliverable" email spoof for spam control.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Anti-Spam Spoofing From Server

The problem is gobs and gobs of email spam. Spammers buy and sell lists of "valid" email addresses, flooding networks with unwanted, often scrupulous solicitations. Currently most companies or services use filters, but that does not impact the source or sender.

One technique is to use brute force against a known domain (***@us.ibm.com) where randomly generated or commonly used names are tried against the domain, and then all invalid ones are filtered out based on the "undeliverable" messages.

The proposed solution is that on receipt of a "known spam" (as per current filter or pattern matching techinques), the server will send back a "undeliverable mail" to the sender, even if it is a valid email address .

The hope here is that the sender will no longer be able to validate this email address as valid, and therefore not be able to "sell" as part of a list, or possibly be removed from existing lists. There are client based solutions and scripts that do this (from google search), but none that I have found that combine or add to a server-based filter.

1