Another good thing about that is that if spammers harvest addresses and
send mail to that address, they will be listed at uceprotect. I use
their level 1 dnsbl in sendmail and that means those spammers will
rather unlikely be able to deliver their junk to my real inbox.
On Thu, 15 Feb 2024 08:44:45 +0100from the victims by a pay-to-delist scam. UCEPROTECT is the biggest spammer on the Internet. They atomatically spam millions of victims with their pay-to-mail scheme via their phony blacklist. Using the blocklist from spammer extortionists is like
Marco Moock <mm+usenet@dorfdsl.de> wrote:
Another good thing about that is that if spammers harvest addresses and
send mail to that address, they will be listed at uceprotect. I use
their level 1 dnsbl in sendmail and that means those spammers will
rather unlikely be able to deliver their junk to my real inbox.
It also means that countless (millions) of totally innocent non-spammers will not be able to deliver email unless they pay an extortion fee to UCEPROTECT. The UCEPROTECT grifters add millions of innocent IP addresses to their blacklist to extort money
It also means that countless (millions) of totally innocent
non-spammers will not be able to deliver email unless they pay an
extortion fee to UCEPROTECT.
On 15/02/2024 17:24, Anonymous wrote:
On Thu, 15 Feb 2024 08:44:45 +0100
Marco Moock <mm+usenet@dorfdsl.de> wrote:
Another good thing about that is that if spammers harvest
addresses and send mail to that address, they will be listed at
uceprotect. I use their level 1 dnsbl in sendmail and that means
those spammers will rather unlikely be able to deliver their junk
to my real inbox.
It also means that countless (millions) of totally innocent
non-spammers will not be able to deliver email unless they pay an
extortion fee to UCEPROTECT. The UCEPROTECT grifters add millions
of innocent IP addresses to their blacklist to extort money from
the victims by a pay-to-delist scam. UCEPROTECT is the biggest
spammer on the Internet. They atomatically spam millions of victims
with their pay-to-mail scheme via their phony blacklist. Using the blocklist from spammer extortionists is like inviting Cosa Nostra
to protect your cash register.
My mailserver was listed 2 weeks ago (due to a user who sent me an
email from a domain like MX that points to one of their spam-trap
servers). Too bad that my mailserver as anti-spam protection does a reverse-check on the sender's domain to check if that user really
exists, and they interpret this as an attempt to send spam (so they
don't really check whether someone sends spam, just you try to
connect, and you're listed).
Do you use the VRFY SMTP command to check that or simply try to send an
email but close the connection then?
That is the intended command. If a server doesn't provide that, they
don't want to have the sender checked.
The latter will be interpreted as abuse by them.
If you fear that somebody forges the sender, check SPF/DKIM strictly
and reject them if it doesn't pass.
The problem behind sender verification is that if somebody sends
thousands of mails with your sender, the receiving servers will try to
send you 1000 verification attempts.
Stuff like SPF/DKIM can be cached in the DNS resolver.
The brainlets at Microsoft still use UCEPROTECT for their live and outlook mail hosts. Countless innocent sysops are blocked from sending messages to any Microsoft customers.
On 15.02.2024 um 20:30 Uhr Ivo Gandolfo wrote:
All it takes is a connection to their mail server and your IP goes
straight to the blacklist.
In level 1?
In level 1?
All it takes is a connection to their mail server and your IP goes
straight to the blacklist.
On 15/02/2024 22:02, Anonymous wrote:
The brainlets at Microsoft still use UCEPROTECT for their live and outlook mail hosts. Countless innocent sysops are blocked from sending messages to any Microsoft customers.
Not anymore. I got to try and they also removed that blacklist, too many false positives (in the company where I work we use Microsoft services,
and their local technician confirmed this to me just 2 days ago).
On Thu, 15 Feb 2024 21:37:21 +0100
Marco Moock <mm+usenet-es@dorfdsl.de> wrote:
On 15.02.2024 um 20:30 Uhr Ivo Gandolfo wrote:
All it takes is a connection to their mail server and your IP goes straight to the blacklist.
Don't even visit their site. Your local IP might end up on an exploit
list or sold to the BND and tied to the email or IP you were
investigating.
As far as intelligence agencies go the schneubli-eating German BND
is the wurst. They are basically a clearing house or point man
operation for the worst criminals who infect Swiss and U.S.
intelligence agencies.
Learn from the history of Crypto AG about the relationships of these
agencies and the criminals that run them. Email blacklists serve as convenient reverse-lookup data stores for surveillance agencies. Of
course they will look the other way when their assets are robbing
people. It's a perk of doing business.
Going forward I want to use IPv6 for all new mail domains and
subdomains and set upstream rDNS records for each subdomain (mail,
smtp, pop, imap). It seems like the IPv4 space is a shrinking
battlefield of annoyance.
Remember: Every intelligence agency acts against their citizens.
On 15.02.2024 um 21:02 Uhr Anonymous wrote:
On Thu, 15 Feb 2024 21:37:21 +0100
Marco Moock <mm+usenet-es@dorfdsl.de> wrote:
On 15.02.2024 um 20:30 Uhr Ivo Gandolfo wrote:
All it takes is a connection to their mail server and your IP goes straight to the blacklist.
Don't even visit their site. Your local IP might end up on an exploit
list or sold to the BND and tied to the email or IP you were
investigating.
That sounds like a porky-pie.
As far as intelligence agencies go the schneubli-eating German BND
is the wurst. They are basically a clearing house or point man
operation for the worst criminals who infect Swiss and U.S.
intelligence agencies.
Remember: Every intelligence agency acts against their citizens.
Learn from the history of Crypto AG about the relationships of these agencies and the criminals that run them. Email blacklists serve as convenient reverse-lookup data stores for surveillance agencies. Of
course they will look the other way when their assets are robbing
people. It's a perk of doing business.
Why do they want to surveil the IP addresses listed there?
Many spammer-loving ASNs are in certain countries where the western
agencies don't have access.
On 22.02.2024 um 23:26 Uhr Randolf Richardson 張文道 wrote:
I've never thought of UCE-PROTECT to be a direct source of
drama; an indirect source, maybe, but that's just because they seem to
be highly successful at upsetting a lot of spammers.
True, and that is one of the good things.
Sadly, some people treat level 2/3 wrong.
But the best thing is still the cart00neys section. http://www.uceprotect.org/cart00neys/
I've never thought of UCE-PROTECT to be a direct source of
drama; an indirect source, maybe, but that's just because they seem to
be highly successful at upsetting a lot of spammers.
That "not the brightest bulb in the chandelier" line is
wonderfully brilliant! :D
On 23.02.2024 um 10:04 Uhr Randolf Richardson 張文道 wrote:
That "not the brightest bulb in the chandelier" line is
wonderfully brilliant! :D
Maybe this is simply translated from German.
One of the uceprotect operators is from Bavaria and moved to
Switzerland.
In German, the term "Nicht die hellste Kerze auf dem Kronleuchter" is
the translation of that sentence.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 463 |
Nodes: | 16 (2 / 14) |
Uptime: | 141:46:04 |
Calls: | 9,381 |
Calls today: | 1 |
Files: | 13,558 |
Messages: | 6,094,744 |