
-----BEGIN PGP SIGNED MESSAGE----- On Thu, 3 Jul 1997, Ryan Anderson wrote:
On Fri, 4 Jul 1997, ? the Platypus {aka David Formosa} wrote:
There is now meany patchers to avoid mail relaying like this. Good ISP's don't let mail to go from an outside site to anoughter outside site.
(identical to how the ISPs customers drop off mail)
No its diffrent ISP's customers move from the inside to the outside.
Well, with current technology, it's not too difficult to forge DNS entries, and I imagine you could forge enough entires to confuse a reverse DNS lookup. But this is really a different issue and I think the most recent version of Bind fixes some of these problems..
It would be possible to configure sendmail to only deliver a message that has an authorized host in the "MAIL FROM" and "RCPT TO" commands. This could possibly be defeated by forging DNS entries in the ISP's nameserver, but that's more than most spammers would probably want to risk.
----------------------------------------------------------------------- Ryan Anderson - <Pug Majere> "Who knows, even the horse might sing" Wayne State University - CULMA "May you live in interesting times.." randerso@ece.eng.wayne.edu Ohio = VYI of the USA PGP Fingerprint - 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 -----------------------------------------------------------------------
Mark -----BEGIN PGP SIGNATURE----- Version: 2.6.3 Charset: noconv iQEVAwUBM7ximCzIPc7jvyFpAQG51Qf8CBZziavfiVJzBqBWqzt28qNlnRG+LmFe dWb6Ba2fqAUWmaEuM3ZniyOcZwGQGpZqev7uRFf75jNk0eNwRd2hW8jEh+Eeqkwc fs8g0dvyS0j1Wxa2EJahIhouaNkvrxZE7ZLVWNhIIF05a1IAnOxTCmfkubBi0gdR W23PRQYG2ldePPlx3Ue4yctTTp6kXsmLv7OilcN8mx+Es7uXitGQUlCaFDFekj8k LxtcJ10kzXyZ/5UylcKXnNBWbyD/P9RjKLcH+5HiURPY2FXoWf6XzwSSzLGGPr3a Taq3XTx5brL+KW1pKlvOtlTp9G7xQ6jBPzHjWd26kl8Gq+B0Udo9hQ== =2d7Q -----END PGP SIGNATURE-----