*** Hanno Böck <ha...@hboeck.de> wrote:
> Am Mittwoch 12 August 2009 schrieb Michael Meyer:
> > As I wrote:
> >
> > http://www.remote.org/jochen/mail/info/address.html#percenthack
> > "The so called percent hack is another form of source route."
> 
> Okay, thanks for the information. Though I read there:
> "So it sends the mail on to mail.mit.edu and so on. This use of the percent 
> sign is deprecated because of the associated risk of spam relaying. (See 
> above.)
> 
> Note that there is no official document, that makes the percent sign special. 
> It is strictly up to the receiving host, whether it will interpret the 
> percent 
> sign in this special way."
> 
> Conclusion:
> a) it's not official
> b) it's deprecated

c) AFAIK many MTAs (sendmail,exim,qmail,...) support the "percent hack". 

> So what the openvas-test does is assuming a delivery that doesn't happen. The 
> way openvas works it can't check. If we wanna keep that check, we should at 
> least put some more information into the warning.

I dont't know if we *realy* need this check. I'm not a "specialist" for
MTAs. I have seen that some "Open-Relay-Tests" on the internet do
checks for the "percent hack" too. 

I agree that we need to put some more information into the warning if
we keep this check.

Hm...
http://homepages.tesco.net/J.deBoynePollard/FGA/smtp-erroneous-open-relay-tests.html

Micha
_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

Reply via email to