North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Verizon is easily fooled by spamming zombies (was: Re: VerizonWireless.com Mail Blacklists)

  • From: Patrick W. Gilmore
  • Date: Wed Jun 01 14:05:44 2005

On Jun 1, 2005, at 1:54 PM, Christopher L. Morrow wrote:

Received: from verizon.net ([63.24.130.230])

(63.24.130.230 is 1Cust742.an1.nyc41.da.uu.net, HELO'd as 'verizon.net'
and VZ still relayed it)
keep in mind I'm just thinking out loud here, but is it possible that
verizon is using someone else for dial access in places? So, perhaps these
are VZ customers doing the proper helo based on their funky mail client?
You might be right.

I couldn't get to 63.24.130.230, but from my person server (which has no relation to VZ's network):

[email protected]/1:59PM% telnet relay.verizon.net 25
Trying 206.46.232.11...
Connected to relay.verizon.net.
Escape character is '^]'.
220 sv10pub.verizon.net MailPass SMTP server v1.2.0 - 013105113116JY +PrW ready Wed, 1 Jun 2005 12:59:33 -0500
helo patrick.verizon.net
250 sv10pub.verizon.net
mail from: [email protected]
250 Sender <[email protected]> OK
rcpt to: [email protected]
530 5.7.1 Relaying not allowed: [email protected]

This is much better than I originally thought.

Still think they should allow sending mail from their network though. :)

--
TTFN,
patrick