Am Mittwoch 12 August 2009 schrieb Michael Meyer: > As I wrote: > > http://www.remote.org/jochen/mail/info/address.html#percenthack > "The so called percent hack is another form of source route."
Okay, thanks for the information. Though I read there: "So it sends the mail on to mail.mit.edu and so on. This use of the percent sign is deprecated because of the associated risk of spam relaying. (See above.) Note that there is no official document, that makes the percent sign special. It is strictly up to the receiving host, whether it will interpret the percent sign in this special way." Conclusion: a) it's not official b) it's deprecated So what the openvas-test does is assuming a delivery that doesn't happen. The way openvas works it can't check. If we wanna keep that check, we should at least put some more information into the warning. -- Hanno Böck Blog: http://www.hboeck.de/ GPG: 3DBD3B20 Jabber/Mail: ha...@hboeck.de http://schokokeks.org - professional webhosting
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ Openvas-devel mailing list Openvas-devel@wald.intevation.org http://lists.wald.intevation.org/mailman/listinfo/openvas-devel