----- Original Message -----
From: David Payer <firstname.lastname@example.org>
Sent: Wednesday, March 10, 1999 7:05 PM
Subject: Re: [NTISP] SMTP Abuse Alert - And the workaround for it.
>. Check on the link below to see if your Mail Server has
>>been hardcoded into this SMTP E-Mail verify Scanner. If it has, I would
>>strongly suggest switching to Mailsite 3.2.0 or equivelent with all the
>>security features to verify mail servers.
>Unfortunately, Mailsite can't solve this. They come in from a valid address
>and do HUNDREDS of queries for valid names on your server. Then they mail
>I wrote Sylvain at Vircom (VOPMail, uses the same engine that Mailsite does
>and has improved it immensely www.vircom.com/vopmail) and he says the only
>way to deal with this is to have a server timeout after a certain number of
>invalid requests. None of the mail servers do that out of the box right
>I would still encourage people to configure their smtp servers properly
>inverse addressing. I personally think this is the way to go.
>For more information about this list, including removal,
>see this url: http://www.iea-software.com/maillist.html
For more information about this list, including removal,
see this url: http://www.iea-software.com/maillist.html