Jacob Anawalt [EMAIL PROTECTED] wrote:
> 
> Bob McElrath said:
> > Darn, I was hoping (aren't we all) for a way to reject it before the
> > whole thing is sent.  You know...it wouldn't be hard to scan the input
> > for the EXE header and close the connection as soon as it's seen.  Then
> > you'd only download 1k or so rather than 150k...
> 
> While you _could_ do that, and if you _knew_ the mail had been sent
> directly from some Windowz end user system and not relayed through a valid
> server (I've noticed a couple of "we dropped the virus but sent you the
> message anyway" swen messages in my inbox) then I guess that would be just
> fine, might as well throw up a firewall rule to block their next attempts
> or have your mail server send 550 reject at the next connection.
> 
> If it's a real server, I thought that it would just try the connection
> again because it didn't get a yes 250 or a no 5xx or even a maybe later
> 3-4xx, and you might not want to firewall or reject all email from a
> mailserver just because one of their users is infected.

Well Swen sends mail directly, no?  Does it retry?  As you said you
could send a 550 on the second connection from that server.

Also I discovered the MaxMessageSize option for sendmail...which
generates a 550.  But I'm weary of using it for all the people that
might complain after trying to send me their 10MB postscript paper.

The whole idea being to reduce the bandwidth eaten by copying virii
around...

> Anyone, please correct me if I'm wrong here. Doesn't protocol dictate that
> if I accept HELO, MAIL FROM and RCPT TO that I'm suppose to accept the
> whole of DATA before I can say 'not ok'. Wouldn't a "connection reset by
> peer" just cause the sending server (if it wasn't a dumb virus smtp
> session) to resend later?

If only we could see the MIME envelope before as part of the SMTP
negotiation...

Well there was that idea a while ago of exponential falloff -- when you
recognize a virus just don't send TCP ACK's (or, send them but double
the time between ACK's between each packet).  This way you not only stop
the virus but also tie up a TCP connection for a long time on the
sender's side.  But the mail would still get delivered.  What ever
happened to that idea?

> So none of the email is to bob+debian? Nice to know that Swen writer
> didn't try too hard. Maybe others won't and people who can should use +/-
> in their email address.

None of the Swen email (that I've noticed)  But I'm using SpamAssassin
to kill Swen and not looking at the To address.

> > Only accepting email that comes from the list to the +debian address
> > wouldn't work because of people (like yourself) that reply to my mails.
> 
> Hey! I thought I'd been very careful on this thread to only send directly
> to the list. I even double checked just now. :P

Well you might have replied privately.  :P

> While I did get your cc'd reply faster than the one you sent to the list,
> I would have gotten the one from the list all the same, and your cc'd
> reply would have bounced with the error code I suggested in that other
> thread.

Check this swanky procmail rule:
    
    # Maintain a msgid cache, and compare incoming mails to eliminate duplicate
    # mails (from crossposted lists, usually), see 'man procmailex'
    :0 Wh: msgid.lock
    |formail -D 8192 msgid.cache

Cheers,
Bob McElrath [Univ. of California at Davis, Department of Physics]

    "Knowledge will forever govern ignorance, and a people who mean to
    be their own governors, must arm themselves with the power knowledge
    gives. A popular government without popular information or the means
    of acquiring it, is but a prologue to a farce or a tragedy or
    perhaps both."
        - James Madison

Attachment: signature.asc
Description: Digital signature

Reply via email to