Re: [NTISP] SMTP Abuse Alert - And the workaround for it.

Carolyn Smith ( (no email) )
Wed, 10 Mar 1999 19:41:56 -0500

We use Imail by ipswitch. How can we protect ourselves?

Carolyn
----- Original Message -----
From: David Payer <david.payer@ia-omni.com>
To: <ntisp@iea-software.com>
Sent: Wednesday, March 10, 1999 7:05 PM
Subject: Re: [NTISP] SMTP Abuse Alert - And the workaround for it.

>. Check on the link below to see if your Mail Server has
>>been hardcoded into this SMTP E-Mail verify Scanner. If it has, I would
>>strongly suggest switching to Mailsite 3.2.0 or equivelent with all the
>>security features to verify mail servers.
>
>Unfortunately, Mailsite can't solve this. They come in from a valid address
>and do HUNDREDS of queries for valid names on your server. Then they mail
to
>them later.
>
>I wrote Sylvain at Vircom (VOPMail, uses the same engine that Mailsite does
>and has improved it immensely www.vircom.com/vopmail) and he says the only
>way to deal with this is to have a server timeout after a certain number of
>invalid requests. None of the mail servers do that out of the box right
now.
>
>I would still encourage people to configure their smtp servers properly
with
>inverse addressing. I personally think this is the way to go.
>
>David Payer
>OMNI Internet
>www.iowalink.com
>
>
>
>For more information about this list, including removal,
>see this url: http://www.iea-software.com/maillist.html
>

For more information about this list, including removal,
see this url: http://www.iea-software.com/maillist.html