Posts

Showing posts from April, 2014

Have you heard? AOL recently changed their email acceptance policy – and it could affect you!

Image
Dear Dundee Internet, What’s “uncategorized failure” all about? My posts– or, it seems, posts from anyone else using AOL–aren’t appearing in my inbox and weren’t yesterday. What’s up? Thanks for your assistance, Mr. Edwards ———————- Dear Mr. Edwards, It appears that AOL has followed Yahoo’s lead and has implemented a DMARC p=reject policy. This breaks all mailing lists worldwide for anyone using a yahoo.com, and now aol.com, From: addresses. See http://postmaster-blog.aol.com/2014/04/22/aol-mail-updates-dmarc-policy-to-reject/ AOL, in the article above, recommends changing the list parameters like this: “For mailing lists, also known as listservs, we recommend configuring reply behavior to fill the From line with the mailing lists address rather than the sender’s and put the actual user / sender address into the Reply-To: line. …” Dundee Internet Support. Need to know more? Contact Us info@dundee.net What do you think? Comments welcomed

Have you heard? Yahoo recently changed their email acceptance policy – and it could affect you!

Image
Yahoo recently changed their email acceptance policy to combat network attacks against their users from bad people using a yahoo.com addresses that are not sent via a yahoo.com server. Yahoo’s decision to reject this class of email fixes their problem but breaks everyone else who sends legitimate email via an Email Service Provider (ESP). Yahoo has been fighting ongoing phishing attacks for a long time. These attacks attempt to compromise legitimate yahoo user accounts. Once compromised the hacker can then send SPAM and phishing emails to the members of the contact list of the compromised account. Ever receive email FROM: (anyone@yahoo.com) containing a link and a message that encourages you to click on it? Just another phishing attempt. Yahoo has control over their own computers but not others. Even though Yahoo has curtailed SPAM and phishing emails oozing out of their servers, hackers seem to always find a way, as they figured out how to continue to send email FROM: anbod