"William X. Walsh" wrote:
>
> The problem here is that one RSP was impersonating another.
> Dotcomnic.net has had a bad reputation on other mailing lists for
> pulling "scams" such as posting as a customer of dotcomnic.net and
> raving about their services and prices, etc. IMO OpenSRS should
> issue a stern warning against dotcomnic.net, and possibly restrict
> them to read only access to the list for abusing their posting
> privileges, not to mention the potential defaming of a reputable RSP
> who is an active and valuable participant on this forum.
>
> I'm of two minds about the RSP only access to the discuss list. In my
> mind it does somewhat go against the openness that this service is
> supposed to be advocating as a part of their model.
>
DHS has found that the domain maxis.net.my is an insecured (open) relay
so
forged mail can flow through easily.
A telnet session on port 25 gave this result and I received the test
mail
successfully.
------------------------begin----------------------
220-mail3.maxis.net.my Microsoft SMTP MAIL ready at Wed, 20 Sep 2000
19:14:05 +0
800 Version: 5.5.1877.467.46
220 ESMTP spoken here
helo dassa.dhs.org
250 mail3.maxis.net.my Hello [203.121.22.189]
mail from:[EMAIL PROTECTED]
250 [EMAIL PROTECTED] OK
rcpt to:[EMAIL PROTECTED]
250 [EMAIL PROTECTED]
data
354 Start mail input; end with <CRLF>.<CRLF>
Subject: Testing Relay
Dkjdhdjehdhskd
.
250 021e62214111490SBIMSPSB01 Queued mail for delivery
quit
221 Quit
------------------------end--------------------------
+===========================+
| Darryl Lynch (Dassa) |
| DHS International Pty Ltd |
+===========================+