|
I wrote: > It looks as though an anti-spam group or individual has decided to > take direct action (I'm guessing) through DoS attacks I spoke too soon. Having examined it a bit further it appears as though this organisation has published spam bait (fake e-mail addresses) on web pages. This is an accepted anti-spam practice. Spammers have harvested the addresses and are attempting to deliver their crud through Nathan's open relay. They've set their mail server up so that it causes the mail queue on the open relay to back up. Nathan, as spammers are already exploiting your open relay to deliver UCE you are not under attack from fix.your.open.relay.or.die.net. Rather you are under attack from whoever is trying to mail fix.your.open.relay.or.die.net through your relay. Dave... "The sooner we get behind schedule, the more time we will have to make it up." -- Anon Construction Superintendent ======================================================= The opinions expressed in this communication are my own and do not necessarily reflect those of my employer.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.