Feeds

This emergency alert has been cancelled by Hotmail

More friendly fire in the war on spam

The Power of One eBook: Top reasons to choose HP BladeSystem

Yesterday's story showing evidence that Microsoft has placed Draconian caps on the number of Hotmail recipients who can receive an email prompted a message from reader Jeff Willis. He says Hotmail routinely blocks mass emails his company, MIS Sciences Corporation, sends on behalf of universities and government agencies.

That's a problem, and it would seem to us, a potential liability for Microsoft, because the blocked dispatches occasionally relate to emergencies, such as when a transit agency notifies subscribers that current weather conditions have rendered a particular traffic route unsafe.

"What's going to happen is an emergency message is going to go out and they're not going to get the message," says Willis, who envisions a handicapped driver getting stuck on a washed-out stretch of highway shortly after Hotmail blocked a warning about a flash flood. "Somebody's going to get hurt."

For the past three months or so, every dispatch sent by MIS results in a flood of rejection notices from Hotmail that read: "452 Too many recipients received this hour." If his list includes 100 Hotmail addressees, Willis will receive 90 failure notices, leading him to surmise that Microsoft lets in 10 and rejects the remainder for a set period of time.

MIS imposes a double opt-in policy for every email list it maintains, meaning users must first visit a website to request their name be added and then they must respond to an email sent to the address they gave. The company connects directly to the Qwest backbone, has SPF, domain keys and proper DNS pointers.

Willis's story comes as Hotmail, Yahoo Mail and other large email providers struggle to cope with the growing amount of spam and other email-borne crud that floods their servers daily. Hotmail alone receives 4.5 billion fraudulent emails per day, an official said a few months ago.

But while the spam problem is global, Hotmail is the only provider that blocks the the alerts, Willis says. He has been in regular contact with Hotmail support people, who have been unable to fix the problem.

A Microsoft statement said in most cases Hotmail will deliver a given email to 100 recipients within a short timeframe.

"But, for IPs that are categorized as unknown or known to be bad, Microsoft limits this number below the recommended default, limiting the spam and abuse to the system. For IPs that hit their max recipients limit we return "552 too many recipients." Microsoft is committed to investing in sender classification and will be limiting the False Positives for users, as well improving their escalation experience."

The statement didn't explain how Willis's outfit could reasonably be categorized as "unknown or known to be bad." ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.