[81219] in North American Network Operators' Group
Re: Verizon is easily fooled by spamming zombies
daemon@ATHENA.MIT.EDU (Martin Hepworth)
Wed Jun 1 13:01:26 2005
Date: Wed, 01 Jun 2005 18:00:37 +0100
From: Martin Hepworth <martinh@solid-state-logic.com>
To: "Patrick W. Gilmore" <patrick@ianai.net>
Cc: nanog@nanog.org
In-Reply-To: <7B91BF16-A66D-4353-A46B-72483E592E65@ianai.net>
X-Solid-State-Logic-MailScanner-From: martinh@solid-state-logic.com
Errors-To: owner-nanog@merit.edu
Patrick W. Gilmore wrote:
>
> On Jun 1, 2005, at 12:28 PM, Steven Champeon wrote:
>
>> IOW, VZ isn't even checking to see if a zombie'd host is forging its
>> own domain into HELO, regardless of whether it comes from Comcast or
>> UUNet, and as long as the forged sender has a verizon.net address, and
>> the recipient hasn't blocked VZ's silly callback system, the message
>> is relayed. Thanks, Verizon. We can hear you now.
>
>
> The other half of this is if you are on VZ's network and try to send
> mail through their system, you cannot unless you have a "verizon.net"
> from address. Or at least that was the case when my friend with VZ DSL
> tried to send e-mail through VZ from her personal domain.
>
Assuming it does via their systems - most zombies have their own smtp
engine from what I understand
--
Martin Hepworth
Snr Systems Administrator
Solid State Logic
Tel: +44 (0)1865 842300
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote confirms that this email message has been swept
for the presence of computer viruses and is believed to be clean.
**********************************************************************