[87138] in North American Network Operators' Group
Re: Clueless anti-virus products/vendors (was Re: Sober)
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Dec 5 21:40:59 2005
To: Douglas Otis <dotis@mail-abuse.org>
Cc: "Steven M. Bellovin" <smb@cs.columbia.edu>,
"Church, Chuck" <cchurch@netcogov.com>, nanog@merit.edu
In-Reply-To: Your message of "Mon, 05 Dec 2005 17:38:00 PST."
<6ACBF732-7453-4D3A-B43C-BCEB30E9009D@mail-abuse.org>
From: Valdis.Kletnieks@vt.edu
Date: Mon, 05 Dec 2005 21:40:09 -0500
Errors-To: owner-nanog@merit.edu
--==_Exmh_1133836808_2936P
Content-Type: text/plain; charset=us-ascii
On Mon, 05 Dec 2005 17:38:00 PST, Douglas Otis said:
> pending the scan. Another solution would be not returning message
> content within a DSN. This would mitigate the distribution of
> viruses, as well as forged bounce-addresses sent to a backup MTAs as
> a method for bypassing black-hole lists. Would changing what is
> returned within a DSN in all cases be a solution?
No. You're still sending a DSN to a destination that you know beforehand
is incorrect.
--==_Exmh_1133836808_2936P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQFDlPoIcC3lWbTT17ARArcBAKDNa9XCKgYFmBG8NZxOiOnpR6ubFQCfQB3X
U8QFPHvjzaTiSKJ1K9dfQlM=
=y6BZ
-----END PGP SIGNATURE-----
--==_Exmh_1133836808_2936P--