<Paul Hutchings wrote:

I work on a simple principle with email.  If I can prove that my server has 
passed the message to the next hop, it's not my problem.

That may sound unhelpful but it's the reality of the situation - if you have logs 
that show the message left the systems under your control and you know where it 
went to, it becomes the owner of that systems problem.>


I don't work on this simplistic principle, but my users are my clients so I do what I can to solve their problems. But this can get complicated and you need to be part detective sometimes. Here is an example of a problem that manifested itself with similar symptoms: Several marketing and sales people at client were complaining about problems with email communications with several ad agencies with whom they were working on high profile projects. These agencies were in LA, NY and Chicago. Emails from these various agencies sometimes arrived on time, sometimes arrived the next morning or in the middle of the night. Sleuthing and telnet were my friends.

All of these agencies were part of one big umbrella agency and all of their emails actually originate from one server located in Chicago. At some point the email admins for the umbrella agency had whitelisted my clients domain name to keep legitimate mail from getting junked (bad idea). This meant that any mail claiming to from that domain bypassed their antispam and went straight to mail servers. The client's domain name happens to be a VERY, VERY commonly spoofed email domain used by spammers. So here is what happened to cause the problem:

Ad agency mail servers received TONS of spam to non-legit email addresses from spoofed emails claiming to be from client. Every spoofed email they recieved they sent an NDR to my clients MX record. The barracuda sitting at that MX record was set to prevent denail of service attacks by denying connections from any IP address that attempts > 1,000 connections during a 24 hour period. Ad company mail server would set this off every day around lunch time because of the massive backscatter and then no legitimate mail would flow for another 24 hours.

The fix for this was for me to get their mail admin to replace their domain name whitelist with our legitimate sending IP address and vice versa. Trying to track that person down in a multinational ad agency was fun.

So, moral of the story, it can get complicated. I almost always start with trying to telnet port 25 from the machine responsible for delivering message to the other sides MX record and see if that will give any clue to what the problem is.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to