Eric,

%-> Please!!!
%-> there HAS to be a way to Block this crap!!
%-> for around a year we have been getting spam from <> with a
%-> reply address of
%-> <>

It looks like your mailer accepts connections from dial-up accounts such as
those operated by Popsite. Spammers like to use these, which is why a lot of
ISPs now block direct-to-MX connections. You might want to consider
subscribing to the MAPS DUL (http://maps.vix.com/dul) -- it looks like
216.126.184. is listed.


[snip]

%-> NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO. So im hoping
%-> that this time
%-> someone will actually reply to this email with an actual
%-> solution and not
%-> ignore this problem like previously when this problem has come
%-> up before and
%-> got ignored by everyone.

Well, this is a list of volunteers... perhaps asking politely might help?
;-)



%-> below is the header, notice the date it was sent :

[snip]

The <> address is easy enough to forge. Telnet into your mail server at port
25 and issue these commands:

ehlo nnex.net
mail from:<[EMAIL PROTECTED]>
rcpt to:<[EMAIL PROTECTED]> (or whatever addy)
data
From: Anyone
To: Anyone
Reply-to: Whoever
Subject: Spam
Blah blah
.


The mailer will put those values into the headers (although you might have
to vary their order a bit).


HTH


-- Juha



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to