Verizon is easily fooled by spamming zombies (was: Re: VerizonWireless.com Mail Blacklists)
Patrick W. Gilmore
patrick at ianai.net
Wed Jun 1 18:01:24 UTC 2005
On Jun 1, 2005, at 1:54 PM, Christopher L. Morrow wrote:
>> Received: from verizon.net ([63.24.130.230])
>>
>> (63.24.130.230 is 1Cust742.an1.nyc41.da.uu.net, HELO'd as
>> 'verizon.net'
>> and VZ still relayed it)
>
> keep in mind I'm just thinking out loud here, but is it possible that
> verizon is using someone else for dial access in places? So,
> perhaps these
> are VZ customers doing the proper helo based on their funky mail
> client?
You might be right.
I couldn't get to 63.24.130.230, but from my person server (which has
no relation to VZ's network):
patrick at p8.bos/1:59PM% telnet relay.verizon.net 25
Trying 206.46.232.11...
Connected to relay.verizon.net.
Escape character is '^]'.
220 sv10pub.verizon.net MailPass SMTP server v1.2.0 - 013105113116JY
+PrW ready Wed, 1 Jun 2005 12:59:33 -0500
helo patrick.verizon.net
250 sv10pub.verizon.net
mail from: patrick at verizon.net
250 Sender <patrick at verizon.net> OK
rcpt to: patrick at ianai.net
530 5.7.1 Relaying not allowed: patrick at ianai.net
This is much better than I originally thought.
Still think they should allow sending mail from their network though. :)
--
TTFN,
patrick
More information about the NANOG
mailing list