I'm gathering the reason this is "a bad way" is because Google is
using multiple servers to send out mail. This is actually a standard
practice, and not limited to Google. If this is a problem for the
university, they need to rethink their systems.
I checked out the university web page and while I understand precious
little German, I did see several references to googlemail.com e-mail
addresses. Faculty and Staff both using them and publishing them as
their address. For this reason, I suspect the "recommends not to use
googlemail" is far from a universal precept.
Also... at no point are the e-mails ever "lost", they just don't get
delivered. Sounds like the university needs to research the use of
domain-keys and SPF records for determining who they will accept mail
from.
On Jan 19, 2008 11:16 AM, Betz.W...@googlemail.com
A... Google is far from the only provider using multiple servers...
AOL does, most ISPs do; and EVERY free mail service does simply
because of their size.
The number of particular servers a system uses will vary depending on
the size of their customer base, but having only 1 is a recipe for
disaster. My ISP might only have 3, so there's a 33% chance the
second attempt will come from the same server, but someone like Google
has probably 30, so there's only a 3.3% chance.
Now... lets go a step further... there are NEVER just 2 attempts. As
your first bounce message was telling you, the servers will continue
to try every 4 hours for 5 days... that's 30 attempts. If there are
less than 30 servers in the queue, at least one will be repeated near
the end, but that requires the receiver to remember EACH attempt and
compare against all others. If they only compare to the very last
attempt, the odds never increase.
If they insist on this type of system, they should at least develop a
trusted host list. This would consist of hosts and systems that have
a) previously passed their little test, or b) have demonstrated a spam
presentation rate of under 10%. They wouldn't even have to develop
their own list as there are dozens of lists out there already
performing that function across the net.
If their intent is to cut down on spam (that's usually why this is
done), then the first step is to do this only for open-relays, or just
refuse acceptance from open-relays. Something like 90% of the spam on
the net is propogated through open-relays. This is done to hide the
spammers' true identity. Their method is generally very good for
open-relay/spam stopping, but a major pain if applied universally.
If a business did exactly what your school is doing... they'd be out
of business. It's too restrictive, and has NO intelligence built into
it. You have to think about these things before deploying them. This
sounds like it was not fully thought out.
Definitely the schools problem, and if it's not brought to their
attention, they'll just let it get worse till it hurts professional
relationships. Microsoft has more servers than Google. I guess they
can't get their patch e-mails to keep the servers running.
On Jan 19, 2008 1:30 PM, Betz.W...@googlemail.com
1. The way bot-networks function is by creating open-relays, so it's
still basically a true statement, just the specifics of HOW it's done
have "advanced to a new level".
2. I can find nothing in RFC2821 that indicates it should be the same
server that reattempts.
3. I don't know that that means... Google uses domain-keys and signs
all the mail and maintains SPF records. Their mail server list is a
matter of public fact, and that can be verified. What is meant by
"can not assure that their addresses are counterfeit"? You mean that
the account that's sending is not verified? You mean that the
university can't verify that it's actually receiving from Google's
authorized servers?
On Jan 22, 2008 11:51 AM, Betz.W...@googlemail.com