[65550] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: incorrect spam setups cause spool messes on forwarders

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Dec 2 09:33:36 2003

To: Suresh Ramasubramanian <suresh@outblaze.com>
Cc: Michael.Dillon@radianz.com, nanog@merit.edu
In-Reply-To: Your message of "Tue, 02 Dec 2003 19:23:41 +0800."
             <20031202112341.515.qmail@team.outblaze.com> 
From: Valdis.Kletnieks@vt.edu
Date: Tue, 02 Dec 2003 09:32:51 -0500
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_-715508086P
Content-Type: text/plain; charset=us-ascii

On Tue, 02 Dec 2003 19:23:41 +0800, Suresh Ramasubramanian <suresh@outblaze.com>  said:

> What they are trying to do is to connect back to email.com's MXs and ensure
> that the user <sgswretyshsdhtest@email.com> who is trying to send them mail
> really does exist, and is not just a figment of some spambot's imagination.

And they tell that how, exactly, given that many sites do NOT allow VRFY or EXPN?

I suppose they could do a MAIL FROM/RCPT TO pair, look at the result, and
QUIT instead of DATA.  Of course, that would be silly, because if it ever ran
into another site that tried the same thing, that site would try to call back
and do a MAIL FROM/RCPT TO...

--==_Exmh_-715508086P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQE/zKKTcC3lWbTT17ARAtCQAKD8HiK6ZfmWTi00laY2HKDz6xadjwCggxcj
TtrwLpOheXyNFDO+HDXZeF8=
=zekM
-----END PGP SIGNATURE-----

--==_Exmh_-715508086P--

home help back first fref pref prev next nref lref last post