North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Echo

  • From: Brad Knowles
  • Date: Sat Aug 17 18:04:45 2002

At 3:55 AM +0200 2002/08/17, Karsten W. Rohrbach wrote:

 	Also, how do you handle echoes of echoes?  For example, if I
 forged e-mail as being from [email protected] and addressed that to
 [email protected] (or whatever), would this generate an endless loop?
 X-Loop:
Hmm. If they send back the entire message as a forward (which would be reasonable), do you scan for this header in the body (i.e., in the forwarded part), or just in the headers of the message that you are receiving?


Thanks again!

--
Brad Knowles, <[email protected]>

"They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety."
-Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++)>: a C++(+++)$ UMBSHI++++$ P+>++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP>+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+(++++) DI+(++++) D+(++) G+(++++) e++>++++ h--- r---(+++)* z(+++)