Matt Kettler wrote:
Steve Martin wrote:
Some trojan/whetever sent an email to a nonexistent address ([EMAIL PROTECTED])
The return address was spoofed as one of my addresses ([EMAIL PROTECTED])
Their brain-dead mailer daemon then sent the failure back to me.


That's not really all that brain-dead.

Of course, they'd be smarter to check the recipient domain at delivery time,
instead of queuing then bouncing later, but VERY few mailservers check this kind
of thing.

The ones I hate are the viruses that forge addresses like [EMAIL PROTECTED], then try to send to [EMAIL PROTECTED] We reject incoming mail claiming to be from [EMAIL PROTECTED] and similar addresses with a "Forgery detected!" error, since we know we'll only ever send that mail from inside our network.

So what happens? The relay reads our error and generates a bounce, sending it to [EMAIL PROTECTED], complete with the "Forgery detected" error we gave them!

The worst part is, I can't convince myself that they *shouldn't* generate the bounce. It's just really annoying!

--
Kelson Vibber
SpeedGate Communications <www.speed.net>

Reply via email to