[11672] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: spam relaying by the big boys

daemon@ATHENA.MIT.EDU (Phil Howard)
Fri Aug 8 00:32:52 1997

From: Phil Howard <phil@charon.milepost.com>
To: moleary@ironlight.com (Myk O'Leary)
Date: Thu, 7 Aug 1997 23:24:16 -0500 (CDT)
Cc: nanog@merit.edu
In-Reply-To: <199708080407.VAA29034@quagmire.> from "Myk O'Leary" at Aug 7, 97 09:07:42 pm

Earlier, Myk O'Leary said:
> 
> Earlier, Jon Lewis said:
> > 
> >    ----- The following addresses had permanent fatal errors -----
> > <abuse@uu.net>
> > 
> >    ----- Transcript of session follows -----
> > ... while talking to mail.uu.net.:
> > >>> RCPT To:<abuse@uu.net>
> > <<< 550 <abuse@uu.net>... User unknown
> > 550 <abuse@uu.net>... User unknown
> 
> Connected to mail.uu.net.
> Escape character is '^]'.
> 220 relay1.UU.NET ESMTP
> vrfy fsdf
> 550 fsdf... User unknown
> vrfy abuse
> 250 <abuse@relay1.UU.NET>
> quit
> 221 relay1.UU.NET closing connection
> -- 

So the PR department got the word out before the sysadmins got the mailbox
created?  So which department is overloaded?

-- 
Phil Howard KA9WGN   +-------------------------------------------------------+
Linux Consultant     |  Linux installation, configuration, administration,   |
Milepost Services    |  monitoring, maintenance, and diagnostic services.    |
phil at milepost.com +-------------------------------------------------------+

home help back first fref pref prev next nref lref last post