[87164] in North American Network Operators' Group
Re: Clueless anti-virus products/vendors (was Re: Sober)
daemon@ATHENA.MIT.EDU (Douglas Otis)
Wed Dec 7 20:03:16 2005
In-Reply-To: <Pine.LNX.4.62.0512072342170.23076@pop.ict1.everquick.net>
Cc: nanog@merit.edu
From: Douglas Otis <dotis@mail-abuse.org>
Date: Wed, 7 Dec 2005 17:02:51 -0800
To: "Edward B. Dreger" <eddy+public+spam@noc.everquick.net>
Errors-To: owner-nanog@merit.edu
On Dec 7, 2005, at 4:06 PM, Edward B. Dreger wrote:
>
> Hmmmm. BATV-triggered bounces. Virus triggers forged bounce which in
> turn triggers "your DSN was misguided" bounce. Perhaps the bandwidth
> growth of the '90s will continue. ;-)
BATV should not trigger any bounce as this only changes the local-
part of the bounce-address (a.k.a return-path). BATV allows quick
rejection of the session when a spoof is detected before any message
is exchanged. This should alleviate your concerns about bandwidth.
It would also depreciate this tactic and further reduce related
traffic. Being sensitive about spoofed DSNs, one would expect to
hear accolades for BATV rather than berating.
-Doug