Re: [WISPA] domain spam attack - JoeJob

2009-12-30 Thread Ugo Bellavance
On 2009-12-30 10:31, Kurt Fankhauser wrote: Does anyone have any experience with having an attack done on your domain where the sender spoofs the header and then puts your domain in it as the sender. I think this is called a JoeJob and we are getting 1000's of the bounced messages because of

Re: [WISPA] domain spam attack - JoeJob

2009-12-30 Thread Matt
Does anyone have any experience with having an attack done on your domain where the sender spoofs the header and then puts your domain in it as the sender. I think this is called a JoeJob and we are getting 1000's of the bounced messages because of it and are now having difficulty sending to

[WISPA] domain spam attack - JoeJob

2009-12-29 Thread Kurt Fankhauser
Does anyone have any experience with having an attack done on your domain where the sender spoofs the header and then puts your domain in it as the sender. I think this is called a JoeJob and we are getting 1000's of the bounced messages because of it and are now having difficulty sending to some

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Nick Olsen
General List wireless@wispa.org Subject: [WISPA] domain spam attack - JoeJob Does anyone have any experience with having an attack done on your domain where the sender spoofs the header and then puts your domain in it as the sender. I think this is called a JoeJob and we are getting 1000's

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Matt Hardy
You can implement the use of SPF records in your dns/mx settings. This will tell mail servers which use SPF checking (which many do) to only allow mail from your domain name to come from the mail servers / IPs that you specify (in the SPF records) are allowed. Any mail coming from non-allowed IPs

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Tom DeReggi
@wispa.org Sent: Wednesday, December 30, 2009 10:31 AM Subject: [WISPA] domain spam attack - JoeJob Does anyone have any experience with having an attack done on your domain where the sender spoofs the header and then puts your domain in it as the sender. I think this is called a JoeJob and we

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Terry Hickey
...@brevardwireless.com To: WISPA General List wireless@wispa.org Sent: Tuesday, December 29, 2009 8:54 AM Subject: Re: [WISPA] domain spam attack - JoeJob Not really. Being in Asia and all. We have had this happen to us before. Just have to wait for them to go away. Nick Olsen Brevard Wireless (321) 205

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Nick Olsen
...@ligowave.com Sent: Tuesday, December 29, 2009 11:08 AM To: WISPA General List wireless@wispa.org Subject: Re: [WISPA] domain spam attack - JoeJob You can implement the use of SPF records in your dns/mx settings. This will tell mail servers which use SPF checking (which many do) to only allow mail from your

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Matt Hardy
or something like that. Nick Olsen Brevard Wireless (321) 205-1100 x106 From: Matt Hardy mha...@ligowave.com Sent: Tuesday, December 29, 2009 11:08 AM To: WISPA General List wireless@wispa.org Subject: Re: [WISPA] domain spam attack - JoeJob You

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Tom DeReggi
: Re: [WISPA] domain spam attack - JoeJob I use MailScanner http://www.mailscanner.info/ . It allows you to put a watermark on all messages leaving your mailserver. If a bounce come in without the watermark , it trashes it . works like a charm for exactly that. Terry - Original

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Richey
authentication which seems to work very well. Richey -Original Message- From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Tom DeReggi Sent: Tuesday, December 29, 2009 1:48 PM To: WISPA General List Subject: Re: [WISPA] domain spam attack - JoeJob