Although the information in the email is correct and we have found that
server to be an open relay, I decline to take credit for the email.
Obviously from the headers, yet another forgery.
BTW...all parties were notified about a month ago about the open relay and
the fact forgeries were being sent through that network. Obviously no
action taken as yet, which has been a reasonable amount of time. The mail
from that domain is being dumped by DHS, I recommend the same action is
taken elsewhere until they prove they have cleaned up their act.
+===========================+
| Darryl Lynch (Dassa) |
| DHS International Pty Ltd |
+===========================+
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Dassa
Sent: Wednesday, September 20, 2000 9:34 PM
To: William X. Walsh; [EMAIL PROTECTED]
Subject: Re: Just WHO IS Bruce P.?
DHS has found that the domain maxis.net.my is an insecured (open) relay
so
forged mail can flow through easily.
A telnet session on port 25 gave this result and I received the test
mail
successfully.
------------------------begin----------------------
220-mail3.maxis.net.my Microsoft SMTP MAIL ready at Wed, 20 Sep 2000
19:14:05 +0
800 Version: 5.5.1877.467.46
220 ESMTP spoken here
helo dassa.dhs.org
250 mail3.maxis.net.my Hello [203.121.22.189]
mail from:[EMAIL PROTECTED]
250 [EMAIL PROTECTED] OK
rcpt to:[EMAIL PROTECTED]
250 [EMAIL PROTECTED]
data
354 Start mail input; end with <CRLF>.<CRLF>
Subject: Testing Relay
Dkjdhdjehdhskd
.
250 021e62214111490SBIMSPSB01 Queued mail for delivery
quit
221 Quit
------------------------end--------------------------