[297] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Returned Mail

daemon@ATHENA.MIT.EDU (bill.stewart@pleasantonca.ncr.com )
Sat Jan 14 02:56:09 1995

Date: Fri, 13 Jan 95 16:57:54 EST
From: wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
To: www-security@ns1.rutgers.edu
Cc: postmaster@attpls.net
Reply-To: www-security@ns2.rutgers.edu

Most of the mailing lists I use are configured so that mail to the
foo-list is sent out by foo-owner@bar.com or some such address
(at least foo-list-request), so that bouncegrams don't go to the
whole list - www-security is misconfigured.  I haven't yet noticed
whether the bouncemail from attpls.net about some bad address
is also getting forwarded to the bogususer at attpls.net,
which could be Bad, or whether attpls.net has some loop prevention
that keeps it from bouncing messages that contain attpls.net 
bouncegrams, just to prevent such loops.

		Bill
# Bill Stewart  AT&T Global Information Solutions, aka NCR Corp
# 6870 Koll Center Parkway, Pleasanton CA, 94566 Phone 1-510-484-6204 fax-6399
# email bill.stewart@pleasantonca.ncr.com billstewart@attmail.com
# ViaCrypt PGP Key IDs 384/C2AFCD 1024/9D6465

home help back first fref pref prev next nref lref last post