[Out of curiosity, I used Paul Vixie's Web based rlytest to see if CPM practiced what she preached about spam. Needless to say, her ISP was a potential point for spammers to relay their bulk mail. When i mentioned it to her so she could report it and have it fixed, she replied..] > I ran rlytest on them, they failed. I mailed CPM saying "funny how you > say you hate spam, yet are on a spam friendly isp". She replied with > something like "one of the admins modified it so it blackholes spam so > spammers think they are successful, it sure tricked you!@#$". I didn't > reply because yes, if it blackholes mail I would never know. Nope. No blackhole. The system, mack.rt66.com is a spammer's wet dream. > Oooh.. PLEASE give me material to abuse her with! Sure thing! For one, here's headers from the most recent spam: - -----Begin quoted text----- - From email@example.com Sun Sep 27 01:00:55 1998 Received: from
id AA16364; Sun, 27 Sep 1998 01:00:54 -0700 Return-Path: Received: from mack.rt66.com by ; Sun, 27 Sep 1998 00:55:41 -0700 Received: from default (ip160.hamilton2.dialup.canada.psi.net [184.108.40.206]) by Rt66.com (8.8.8/8.8.6) with SMTP id BAA10409; Sun, 27 Sep 1998 01:55:02 -0600 (MDT) Date: Sun, 27 Sep 1998 01:55:02 -0600 (MDT) From: firstname.lastname@example.org Message-Id: <199809270755.BAA10409@Rt66.com> To: email@example.com Subject: This stock up 250% Status: R - ----- End quoted text ----- For another, this should be proof enough: TELNET : mack.rt66.com 25 ENTER : HELO ENTER : MAIL FROM: ENTER : RCPT TO: RESULT : When it doesn't say it won't relay, do the following. ENTER : DATA ENTER : Subject: Nyah Looks like this domain is a spam relay to me. . Then the message will be queued and sent. Not exactly rocket science, eh? ;) ( ______ )) .-- "There's always time for a good cup of coffee" --. >===<--. C|~~| (>- Jay D. Dyson - firstname.lastname@example.org -<) | = |-' `--' `--- Just what the truth is, I can't say anymore. ---' `-----'