I might not be understanding your question, but I would test the
provider's server using Telnet.
To see a plethora of testing procedures, just google "telnet smtp test"
Here's a pretty thorough treatment of the subject...
http://www.port25.com/how-to-check-an-smtp-connection-with-a-manual-telnet-session-2/
For the above to work, you'll need to know exactly how the offending
connections are being performed.
As for how the email server on the receiving end handles a full
mailbox...typically the receiving server, not knowing how large the
inbound message is until it has received it, will accept the message
before it checks to see if the mailbox is 'full' and can not handle the
inbound message. So, no, the receiving server won't respond with "sorry,
all full" at the step you are expecting it to (before sending the
message.) Besides that, the "quota" or maximum size for the inbox, is
arbitrary and determined by the email server manager. Because of the
time it would take to calculate the current size (fullness) of your
inbox, the receiving server is going to delay that step in the process
until after the communication with the sending server has ended.
Instead of the receiving server responding with "oh, no, thanks but I'm
full" when you offer another delicious piece of email pie, the receiving
server will, after the receiving connection is closed and the full-osity
has been determined, bounce a message back to the sender's inbox (not
the sending server! it may not be the same) saying something like
"sorry, all full". At that point, you have another issue on your
hands...how does your SENDING email inbox server handle bounce back
messages and what happens when there is a flurry of those?
Bottom line, full email in-boxes are a big pain in the email. With
storage space so cheap though, you should have no problem getting a 10GB
to 25GB inbox (unless you're using a free service, in which case it will
only be around 2GB to 5GB.) It should take hundreds if not thousands of
spams to fill that up! So now we have another issue...inbox maintenance.
Does anyone ever clean out the inbox that is overflowing? (Sorry if you
already covered this, I just did a quick-scan of your first message a
couple of hours ago.)
If you are wanting to determine, for example through a program you
write, what the current "fullness" of your inbox on that email account
is, you can usually do that using the IMAP protocol, but it will take
several steps and you'll need to know the inbox max limit. I say usually
because it, again, depends on the receiving server.
Mike
-------- Original Message --------
Subject: Re: [NF] Standard Email Sender Verification Procedures
From: Ken Dibble <[email protected]>
To: [email protected]
Date: 4/29/2013 2:35 PM
At 02:18 PM 4/29/2013 -0500, you wrote:
One of the first steps in the connection and sending of email from
server to server is to identify who the message is for (sender) and a
response from the receiving server as to whether that person
(address) is known to them. At that point, based on the receiver's
response, the sender can abort the transaction.
Look up the SMTP command RCPT TO.
Example:
RCPT TO: [email protected]
If the user is known, the receiving server will respond with
something like
250 OK - Recipient [email protected]
So it should return 250 if the recipient exists, regardless of whether
that mailbox is full?
The provider's system didn't work this way originally. It didn't stop
refusing to verify a sender whose mailbox was full until after they
implemented a "security update" I think, in late 2011 or early 2012.
According to the Wikipedia article linked by Ted, I think if the SMTP
server attempts RCPT TO: and gets 250 back, it can stop the process at
that point, thereby not delivering a message to the recipient, and can
also refuse to send a bounce message back to the original sender in
order to prevent a dictionary attack.
However, my email client will always display the SMTP error in that
case (550 Sender verify failed) which ought to be just as useful to a
dictionary attacker that can directly read the error message.
So it would seem that nothing really can be done within the realm of
email sender verification to protect against such attacks as long as
the SMTP server emits some kind of response to the original sender
when a message doesn't go through for whatever reason--which, it seems
to me, it must do in some manner. At least, in the case of my ISP,
returning 550 ought to be just as valuable to a spammer as anything
else it could return short of outright lying, in which case a
legitimate sender would have a problem.
The Wikipedia article implies that security (over) conscious mail
admins may be misusing the protocols. However, I don't understand this
well enough to develop a response for my provider.
Can you (or anyone) perhaps suggest exactly what sequence of commands
and responses I should ask my provider to use for sender verification?
Thanks.
Ken Dibble
www.stic-cil.org
[excessive quoting removed by server]
_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message:
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the
author, and do not constitute legal or medical advice. This statement is added
to the messages for those lawyers who are too stupid to see the obvious.