North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Clueless anti-virus products/vendors (was Re: Sober)

  • From: Suresh Ramasubramanian
  • Date: Sat Dec 03 03:28:18 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=oA8Qoi2gbI/AuSA4MhnD4NGMOZyqj6n13ia6tNbtAKweaFZ5+hxSeIau7Oqi1OwTr75OqHvLUGVaxTlpdNHsnKBdAnzibaPmuxLNKbh4QHyP24GncK49z5KTjar//z2OTTfi6lh26A+8xHgEfL8h+TtorfETVbd7zWGMCFHD+ao=

On 12/3/05, Daniel Senie <[email protected]> wrote:
> Can people building virus scanning devices PLEASE GET A %^&*^ CLUE?
> This means you, Barricuda Networks, more than anyone else, but we
> also see this annoyance from Symantec devices, and from some AOL
> systems as well.

The worst offenders that I see -

MailMarshal
eSafe
Symantec devices, as you say

Comparatively little from Barracudas.

And some large carriers / ISPs who send bounces / virus notifications
back with (for example) [email protected][isp] as the return path instead of
MAIL FROM:<>