[65550] in North American Network Operators' Group
Re: incorrect spam setups cause spool messes on forwarders
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Dec 2 09:33:36 2003
To: Suresh Ramasubramanian <suresh@outblaze.com>
Cc: Michael.Dillon@radianz.com, nanog@merit.edu
In-Reply-To: Your message of "Tue, 02 Dec 2003 19:23:41 +0800."
<20031202112341.515.qmail@team.outblaze.com>
From: Valdis.Kletnieks@vt.edu
Date: Tue, 02 Dec 2003 09:32:51 -0500
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_-715508086P
Content-Type: text/plain; charset=us-ascii
On Tue, 02 Dec 2003 19:23:41 +0800, Suresh Ramasubramanian <suresh@outblaze.com> said:
> What they are trying to do is to connect back to email.com's MXs and ensure
> that the user <sgswretyshsdhtest@email.com> who is trying to send them mail
> really does exist, and is not just a figment of some spambot's imagination.
And they tell that how, exactly, given that many sites do NOT allow VRFY or EXPN?
I suppose they could do a MAIL FROM/RCPT TO pair, look at the result, and
QUIT instead of DATA. Of course, that would be silly, because if it ever ran
into another site that tried the same thing, that site would try to call back
and do a MAIL FROM/RCPT TO...
--==_Exmh_-715508086P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQE/zKKTcC3lWbTT17ARAtCQAKD8HiK6ZfmWTi00laY2HKDz6xadjwCggxcj
TtrwLpOheXyNFDO+HDXZeF8=
=zekM
-----END PGP SIGNATURE-----
--==_Exmh_-715508086P--