[62086] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: What *are* they smoking?

daemon@ATHENA.MIT.EDU (netmask)
Mon Sep 15 21:44:11 2003

Date: Mon, 15 Sep 2003 20:43:26 -0500 (CDT)
From: netmask <netmask@enZotech.net>
To: "Wayne E. Bouchard" <web@typo.org>
Cc: Kevin Loch <kloch@gurunet.net>, nanog@merit.edu
In-Reply-To: <20030916013044.GA923@typo.org>
Errors-To: owner-nanog-outgoing@merit.edu


> So then now instead of mail to misspelled domains, instead of
> bouncing, now goes to /dev/null and you have no idea that your
> critically important piece of information didn't get through?
>

Well, it drops the data channel.. So it should still bounce back, but
regardless.. The remote side returns user unknown when I have sendmail do it:

Sep 15 20:48:23 devnull sendmail[626]: h8G1mEH6000624:
to=<blah@lkjasdflkjasdlf.com>, ctladdr=<netmask@devnull.domain.com> (500/500),
delay=00:00:09, xdelay=00:00:09, mailer=esmtp, pri=30324,
relay=lkjasdflkjasdlf.com. [64.94.110.11], dsn=5.1.1, stat=User unknown

Either way.. I don't trust verisign..  I didn't trust them when we were forced
to use them in the mid-90's, and I certainly don't trust them today.

I read that last message regarding the SSL certs.. I don't think they would go
that far.. but, I didn't think they would go this far either. Verisign and SCO
should team up, they could both win awards on lack of ethics.

home help back first fref pref prev next nref lref last post