On Wed, 2003-01-22 at 09:44, Mark C wrote:
> Gordon Messmer wrote:
>
> >>So am I correct in thinking, the mail originated from a blueyonder
> >>dialup/broadband account?
>
> I just want to make 100% sure that this is correct, the original sender
> of the spam, has a blueyonder account?
> So the
On Wed, 2003-01-22 at 09:14, [EMAIL PROTECTED] wrote:
> I am attempting to setup a sendmail server that will receive (and
> relay) emails from users. These users do not reside on the same
> network as my server. In fact, I have no way of knowing what domains
> the various users will be on.
Use
9:38 AM
> To: [EMAIL PROTECTED]
> Subject: Re: Contacting an Open Relay server user by spammer
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 22 Jan 2003 16:56:51 +0100, Peter Boy wrote:
>
> > > Efficiently, you can fight SPAM only where you have con
Gordon Messmer wrote:
So am I correct in thinking, the mail originated from a blueyonder
dialup/broadband account?
I just want to make 100% sure that this is correct, the original sender
of the spam, has a blueyonder account?
So the spammer could not of come from say a freeserver or ntl accoun
Title: RE: Contacting an Open Relay server user by spammer
I believe there is a method of validating
users by requiring them to pop before smtp? (I might have that backward, I am sure I will
quickly be corrected, lol) The users
have to check incoming email before they send email and
Title: RE: Contacting an Open Relay server user by spammer
So, forgive the sendmail newbie question...
I am attempting to setup a sendmail server that will receive (and relay) emails from users. These users do not reside on the same network as my server. In fact, I have no way of knowing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 22 Jan 2003 16:56:51 +0100, Peter Boy wrote:
> > Efficiently, you can fight SPAM only where you have control over a
> > mail server and where you can reject messages or deny access.
>
> We have full control here (and ask ordb and osirus for open r
On Wed, 2003-01-22 at 06:06, Mark Cooke wrote:
> > Which translates to:
> >
> > Message _from_ (pc-80-193-4-51-nm.blueyonder.co.uk [80.193.4.51])
> > received _by_ mail.pcc.edu.cn _for_ <[EMAIL PROTECTED]> on
> > Wed, 22 Jan 2003 02:55:23 +0800
>
> So am I correct in thinking, the mail origina
Am Mit, 2003-01-22 um 14.11 schrieb Michael Schwendt:
> ...
> Efficiently, you can fight SPAM only where you have control over a
> mail server and where you can reject messages or deny access.
We have full control here (and ask ordb and osirus for open relay before
accepting mail as a first de
he have "remove" instructions.
Well, hopefully that helps something.
Good luck
Buck
(I hate spam!)
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
On Behalf Of Mark Cooke
Sent: Wednesday, January 22, 2003 9:07 AM
To: [EMAIL PROTECTED]
Subject: Re: Contacting an
That was probably the _source_ of the spam.
On Wednesday 22 January 2003 01:45 am, Mark Cooke wrote:
> Hi,
>
> A friend of mine has just received about 200 spam mails (why 200,
beats me),
> Anyway, I have found out from the headers, who received what and who
was
> the initial point of injection
Received: from i
>> >> OpenRelay Server: pc-80-193-4-51-nm.blueyonder.co.uk [80.193.4.51]
>>
>> So why is this blueyonder address in there then ?
>
> It is the sender's hostname and IP address which in the "Received:" line
> is stored right after the sender's greeting string. Read it
> like this:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 22 Jan 2003 12:06:05 - (GMT), Mark Cooke wrote:
>
> >> Spammer: smtp0542.mail.yahoo.com
> >
> > No, that is not the spammer. That was faked. You can submit an
> > arbitrary sequence of characters in the greeting line when
> > connecting t
>> Spammer: smtp0542.mail.yahoo.com
>
> No, that is not the spammer. That was faked. You can submit an
> arbitrary sequence of characters in the greeting line when
> connecting to a mail server.
I was under the assumsion that that was the faked from address of the host
>> OpenRelay Server: pc-80
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 22 Jan 2003 09:45:40 - (GMT), Mark Cooke wrote:
> A friend of mine has just received about 200 spam mails (why 200,
> beats me), Anyway, I have found out from the headers, who received
> what and who was the initial point of injection, I w
It could be a case of forged headers. I've had that on one of my
accounts. Mail bounced back to me that a spammer sent, but it didn't come
from that account.
Mark
On Wed, 22 Jan 2003, Mark Cooke wrote:
> Hi,
>
> A friend of mine has just received about 200 spam mails (why 200, beats me),
> Any
16 matches
Mail list logo