[Out of curiosity, I used Paul Vixie's Web based rlytest to see if
 CPM practiced what she preached about spam. Needless to say,
 her ISP was a potential point for spammers to relay their bulk 
 mail. When i mentioned it to her so she could report it and 
 have it fixed, she replied..]

> I ran rlytest on them, they failed. I mailed CPM saying "funny how you
> say you hate spam, yet are on a spam friendly isp". She replied with
> something like "one of the admins modified it so it blackholes spam so
> spammers think they are successful, it sure tricked you!@#$". I didn't
> reply because yes, if it blackholes mail I would never know. 

	Nope.  No blackhole.  The system, mack.rt66.com is a spammer's wet

> Oooh.. PLEASE give me material to abuse her with!

	Sure thing!  For one, here's headers from the most recent spam:

- -----Begin quoted text-----
- From oppykm@usa.net Sun Sep 27 01:00:55 1998
Received: from 
	id AA16364; Sun, 27 Sep 1998 01:00:54 -0700
Received: from mack.rt66.com by ; Sun, 27 Sep 1998 00:55:41 -0700
Received: from default (ip160.hamilton2.dialup.canada.psi.net [])
	by Rt66.com (8.8.8/8.8.6) with SMTP id BAA10409;
	Sun, 27 Sep 1998 01:55:02 -0600 (MDT)
Date: Sun, 27 Sep 1998 01:55:02 -0600 (MDT)
From: oppykm@usa.net
Message-Id: <199809270755.BAA10409@Rt66.com>
To: oppykm@usa.net
Subject: This stock up 250%
Status: R
- ----- End quoted text -----

	For another, this should be proof enough:

TELNET	: mack.rt66.com 25
RESULT	: When it doesn't say it won't relay, do the following.
ENTER	: Subject: Nyah
	  Looks like this domain is a spam relay to me.

	Then the message will be queued and sent.  Not exactly rocket
science, eh?  ;)

   (                                                            ______
   ))   .-- "There's always time for a good cup of coffee" --.   >===<--.
 C|~~| (>-  Jay D. Dyson - jdyson@techreports.jpl.nasa.gov  -<) |   = |-'
  `--'  `--- Just what the truth is, I can't say anymore. ---'  `-----'