View Single Post
Old 03-31-2003, 11:40 AM  
fnet
Confirmed User
 
Join Date: Jul 2002
Posts: 1,721
Quote:
Originally posted by fiveyes
Your problem is that someone is doing mass e-mailing through open e-mail relays using forged headers that point back to your domains. The use of open e-mail relays means the person originating the mailing is next to impossible to track, so forget about trying to cut off the source.

The only solution that I know of is to rewrite which User Names you will accept e-mail for at your virtual domain. You are most likely receiving all bouncebacks from the bad e-mail addresses in the list. This would be because you are using a wild card pattern in your e-mail recipe.

What is needed- figure out exactly what User Names are required for your web site's operation and limit yourself to only those, throwing everything else into the bit bucket. Contact your tech admin for your web site, explain the problem and they'll implement the required changes (which will vary according to the web server, the interface available to implement changes to the server and whether the mail is being relayed on to another account or is being accessed directly at the site).
Yeah, spam. I didn't even think about the fact that these are all 550 errors. The outlook mail thing still seems weird.

What about contacting the open mail relay owners? Aren't they accessories?

Wouldn't writing a mail filter that looks for a string work just as well as the restrictions you mentioned?
__________________
the sound of one hand googlewhacking
fnet is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote