Date: Sat, 03 May 1997 02:57:31 -0500 From: "Jeffrey J. Mountin" <sysop@mixcom.com> To: "Daniel O'Callaghan" <danny@panda.hilink.com.au> Cc: FreeBSD-Hackers@FreeBSD.ORG Subject: Re: SPAM target Message-ID: <3.0.32.19970503025730.00b0b99c@mixcom.com>
next in thread | raw e-mail | index | archive | help
At 03:48 PM 5/3/97 +1000, Daniel O'Callaghan wrote: >Only until the rats learn the new maze - all they have to do there is to >give a real domain with a fake user. e.g. nobody@lon3.melbourne.telstra.net. They do this already. >So then you teach sendmail to attempt to verify the user in the From: > >MAIL FROM: <danny@hilink.com.au> >{hang on a tick, connect hilink.com.au, HELO, MAIL FROM: <sendmail@here>, >RCPT TO: <danny@hilink.com.au>, 250 RCPT OK, QUIT} >Now, what were you saying... > >So then they take the first bunny in the list of spam addresses and make >him the apparent sender. :-( If you allow vrfy that is. Also need to block receipts too. Hmmm.... have to look, such a check could be built in to our proxy. >The only real solution is the removal of SMTP and a new MTP which >requires everyone in the world to have a signing certificate from a >recognised CA. Yes this would be good... don't know a whole lot about IPv6, but isn't this problem addressed? Along with "proper" setup of services. ------------------------------------------- Jeff Mountin - System/Network Administrator jeff@mixcom.net MIX Communications Serving the Internet since 1990
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.32.19970503025730.00b0b99c>