When we migrated our on prem server to a hosting service we didnt want to
have every customer have to reset their passwords (its easier to walk
grandma ethel through changing a server name than changing a password)so we
sniffed port 25 for a long time collecting usernames and passwords (our box
"The cloud is the future"
It certainly isn't. It's largely a fad that's already has people removing the
wool from their eyes and moving on.
-
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP
- Original Message -
From: "Darin
"I can assure you Gmail doesn't block emails that are..."
I can assure you that they do. Scale is hard. The Mailops mailing list has a
lot of traffic regarding the big mail providers epicly failing at mail
constantly.
-
Mike Hammett
Intelligent Computing Solutions
Midwest
Who remembers a famous USENET author that had:
A host is a host from coast to coast
(what was the next line?)
As part of their signature.. Not the copycats, but the original...
On 3/12/23 13:13, Chuck McCown via AF wrote:
Back in the day, just sniffing the ethernet would get you all the
The original Usenet email had the actual path to a major server (ATT,
UCB, UCSB, etc... ) in the beginning every email address, pretty hard
not to know the path of the users back then...
On 3/12/23 13:01, Forrest Christian (List Account) wrote:
Internet email isn't anonymous, never was. Even
Proxmox Mail Gateway and Zimbra. Kick your feet up and move on with life.
-
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP
- Original Message -
From: "Chuck McCown via AF"
To: af@af.afmug.com
Cc: "Chuck McCown"
Sent:
Back in the day, just sniffing the ethernet would get you all the email flying
around your company. Was kinda fun.
I know one guy that would purposely jam another’s outgoing email.
Once he detected who it was from he would just turn on transmit. This was on a
CSMA/CD coaxial network.
Internet email isn't anonymous, never was. Even in the early days.
There has always been a multitude of ways to track email back to the
origin server. And there has been a multitude of ways to obfuscate but not
hide that origin.
Any anonymity you may have is based on the origin server either
You can't spoof SPF or DKIM unless you also have access to a domain's dns
records.
On Sun, Mar 12, 2023, 2:17 PM Jan-GAMs wrote:
> Because 45 years ago my company was connected to the rest of itself via
> the arpanet and they promised us on a stack of bibles that those who used
> the email
I've run, successfully, my own email server. It isn't that hard. Had to
in the early days. Pain in the ass to maintain and manage, yes. Pain to
get running, not so much. It's a big enough pain to run on an ongoing
basis that I choose to pay someone else to do it nowadays.
As far as
Punchcards buttons and switches.Sent from my iPhoneOn Mar 12, 2023, at 8:55 AM, Bill Prince wrote:CLI rules.--bppart15sbs{at}gmail{dot}comOn Sun, Mar 12, 2023 at 7:34 AM Forrest Christian (List Account) wrote:I can insert a spoofed email using only telnet to port 25 on a
CLI rules.
--
bp
part15sbs{at}gmail{dot}com
On Sun, Mar 12, 2023 at 7:34 AM Forrest Christian (List Account) <
li...@packetflux.com> wrote:
> I can insert a spoofed email using only telnet to port 25 on a mail server
> in about 30 seconds not counting the time it takes to type the message
>
12 matches
Mail list logo