Eric,
%-> Please!!!
%-> there HAS to be a way to Block this crap!!
%-> for around a year we have been getting spam from <> with a
%-> reply address of
%-> <>
It looks like your mailer accepts connections from dial-up accounts such as
those operated by Popsite. Spammers like to use these, which is why a lot of
ISPs now block direct-to-MX connections. You might want to consider
subscribing to the MAPS DUL (http://maps.vix.com/dul) -- it looks like
216.126.184. is listed.
[snip]
%-> NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO. So im hoping
%-> that this time
%-> someone will actually reply to this email with an actual
%-> solution and not
%-> ignore this problem like previously when this problem has come
%-> up before and
%-> got ignored by everyone.
Well, this is a list of volunteers... perhaps asking politely might help?
;-)
%-> below is the header, notice the date it was sent :
[snip]
The <> address is easy enough to forge. Telnet into your mail server at port
25 and issue these commands:
ehlo nnex.net
mail from:<[EMAIL PROTECTED]>
rcpt to:<[EMAIL PROTECTED]> (or whatever addy)
data
From: Anyone
To: Anyone
Reply-to: Whoever
Subject: Spam
Blah blah
.
The mailer will put those values into the headers (although you might have
to vary their order a bit).
HTH
-- Juha
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.