Hi Michael,
We have tried to contact msn-s...@microsoft.com few times now but didn't
hear back.
All the FBL complaints are going to previous IP owner's feed address which
has no access(or should not have access) to the IP range.
Any other suggestions?
Thanks,
Syed
On Mon, Apr 25, 2016 at 1:27
Franck Martin via mailop wrote:
> This page, provides a way to test EDNS:
> https://www.dns-oarc.net/oarc/services/replysizetest
That's testing the EDNS large packet feature. A DNS server can support
EDNS without supporting large packets.
Tony.
--
f.anthony.n.finchhttp://dotat.at/ - I xn
Dave Warren wrote:
>
> They're broken by design and not fit for purpose. Among their many flaws, they
> don't even make it to RFC821 3.1, the MAIL command, which is described as the
> following:
>
> MAIL FROM:
>
> Instead, when they receive a "M" in a packet alone, they interpret it as an
> inva
On Thu, May 5, 2016 at 9:00 PM, Steve Atkins wrote:
> I've seen them do that when they get out of sequence. Are you doing the
> transaction above by hand (and with a real HELO and so on), or is it from
> MTA logs?
By hand, real HELO and MAIL FROM, followed by RSET or QUIT, but AIUI, RSET
or QU
On Thu, May 5, 2016 at 10:10 PM, Dave Warren wrote:
> Given that RFC 821 is from August of 1982, I would wholeheartedly
> recommend unplugging them until they catch up to at least 1984, or if
> that's not possible, at least disable the SMTP-breaking "feature". Even
> Microsoft published a how-to
We're seeing an issue with delivering to sba.gov. The DNS servers we reference
from these MTAs are showing SERVFAIL for a PTR lookup on 165.110.5.75.
http://dnsviz.net/d/75.5.110.165.in-addr.arpa/dnssec/
seems to imply they're having a DNSSEC issue (unless I'm misinterpreting the
output). T
> On May 6, 2016, at 6:04 AM, Todd Herr wrote:
>
>
> On Thu, May 5, 2016 at 9:00 PM, Steve Atkins wrote:
> I've seen them do that when they get out of sequence. Are you doing the
> transaction above by hand (and with a real HELO and so on), or is it from MTA
> logs?
>
> By hand, real HELO
A user sent a message to the django-users list asking for help. I replied
and about 5 minutes later I got a 'bounce' message that is basically a
bounce message laden with spam.
http://imgur.com/Ohn6sPE
Is this a new method of delivering spam? Get 'someone' like
j...@piccloud.com to sign up for
Weird. I've been involved with mail servers for 15 years, and it's the
first time I've run in to that.
Out of all the spam I've seen, this strikes me as the absolute sleaziest
possibly way to go about it...
/me makes preparations to nuke bounceio from orbit...
Thanks,
-A
On Fri, May 6, 2016 a
It's called bounceio 'domain monetization' and it's not new at all. They
will send bounces specifically back to the sender address and not the
return path address. Like any spam operation, it's UCE. Unlike any other
spam operation, not enough people mark them as spam, so their email still
gets acce
On Fri, May 6, 2016 at 3:22 AM, Tony Finch wrote:
> Franck Martin via mailop wrote:
>
> > This page, provides a way to test EDNS:
> > https://www.dns-oarc.net/oarc/services/replysizetest
>
> That's testing the EDNS large packet feature. A DNS server can support
> EDNS without supporting large pa
If your network people think they can do a better job than your mail
people, then give them the management of your mail servers, otherwise, tell
them to disable cisco fixup (or whatever it is called nowadays).
On Fri, May 6, 2016 at 8:15 AM, Steve Atkins wrote:
>
> > On May 6, 2016, at 6:04 AM,
On 6 May 2016, at 9:05, Todd Herr wrote:
On Thu, May 5, 2016 at 10:10 PM, Dave Warren
wrote:
Given that RFC 821 is from August of 1982, I would wholeheartedly
recommend unplugging them until they catch up to at least 1984, or if
that's not possible, at least disable the SMTP-breaking "featur
13 matches
Mail list logo