[87164] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Clueless anti-virus products/vendors (was Re: Sober)

daemon@ATHENA.MIT.EDU (Douglas Otis)
Wed Dec 7 20:03:16 2005

In-Reply-To: <Pine.LNX.4.62.0512072342170.23076@pop.ict1.everquick.net>
Cc: nanog@merit.edu
From: Douglas Otis <dotis@mail-abuse.org>
Date: Wed, 7 Dec 2005 17:02:51 -0800
To: "Edward B. Dreger" <eddy+public+spam@noc.everquick.net>
Errors-To: owner-nanog@merit.edu



On Dec 7, 2005, at 4:06 PM, Edward B. Dreger wrote:
>
> Hmmmm.  BATV-triggered bounces.  Virus triggers forged bounce which in
> turn triggers "your DSN was misguided" bounce.  Perhaps the bandwidth
> growth of the '90s will continue. ;-)

BATV should not trigger any bounce as this only changes the local- 
part of the bounce-address (a.k.a return-path).  BATV allows quick  
rejection of the session when a spoof is detected before any message  
is exchanged.  This should alleviate your concerns about bandwidth.   
It would also depreciate this tactic and further reduce related  
traffic.  Being sensitive about spoofed DSNs, one would expect to  
hear accolades for BATV rather than berating.

-Doug

home help back first fref pref prev next nref lref last post