nanog mailing list archives

Re: Verizon is easily fooled by spamming zombies (was: Re: VerizonWireless.com Mail Blacklists)


From: "Patrick W. Gilmore" <patrick () ianai net>
Date: Wed, 1 Jun 2005 14:01:24 -0400


On Jun 1, 2005, at 1:54 PM, Christopher L. Morrow wrote:

Received: from verizon.net ([63.24.130.230])

(63.24.130.230 is 1Cust742.an1.nyc41.da.uu.net, HELO'd as 'verizon.net'
and VZ still relayed it)

keep in mind I'm just thinking out loud here, but is it possible that
verizon is using someone else for dial access in places? So, perhaps these are VZ customers doing the proper helo based on their funky mail client?

You might be right.

I couldn't get to 63.24.130.230, but from my person server (which has no relation to VZ's network):

patrick () p8 bos/1:59PM% telnet relay.verizon.net 25
Trying 206.46.232.11...
Connected to relay.verizon.net.
Escape character is '^]'.
220 sv10pub.verizon.net MailPass SMTP server v1.2.0 - 013105113116JY +PrW ready Wed, 1 Jun 2005 12:59:33 -0500
helo patrick.verizon.net
250 sv10pub.verizon.net
mail from: patrick () verizon net
250 Sender <patrick () verizon net> OK
rcpt to: patrick () ianai net
530 5.7.1 Relaying not allowed: patrick () ianai net

This is much better than I originally thought.

Still think they should allow sending mail from their network though. :)

--
TTFN,
patrick


Current thread: