On 2009-12-30 10:31, Kurt Fankhauser wrote:
Does anyone have any experience with having an attack done on your domain
where the sender spoofs the header and then puts your domain in it as the
sender. I think this is called a JoeJob and we are getting 1000's of the
bounced messages because of
Does anyone have any experience with having an attack done on your domain
where the sender spoofs the header and then puts your domain in it as the
sender. I think this is called a JoeJob and we are getting 1000's of the
bounced messages because of it and are now having difficulty sending to
Does anyone have any experience with having an attack done on your domain
where the sender spoofs the header and then puts your domain in it as the
sender. I think this is called a JoeJob and we are getting 1000's of the
bounced messages because of it and are now having difficulty sending to some
General List wireless@wispa.org
Subject: [WISPA] domain spam attack - JoeJob
Does anyone have any experience with having an attack done on your domain
where the sender spoofs the header and then puts your domain in it as the
sender. I think this is called a JoeJob and we are getting 1000's
You can implement the use of SPF records in your dns/mx settings. This
will tell mail servers which use SPF checking (which many do) to only
allow mail from your domain name to come from the mail servers / IPs
that you specify (in the SPF records) are allowed. Any mail coming from
non-allowed IPs
@wispa.org
Sent: Wednesday, December 30, 2009 10:31 AM
Subject: [WISPA] domain spam attack - JoeJob
Does anyone have any experience with having an attack done on your domain
where the sender spoofs the header and then puts your domain in it as the
sender. I think this is called a JoeJob and we
...@brevardwireless.com
To: WISPA General List wireless@wispa.org
Sent: Tuesday, December 29, 2009 8:54 AM
Subject: Re: [WISPA] domain spam attack - JoeJob
Not really. Being in Asia and all.
We have had this happen to us before. Just have to wait for them to go
away.
Nick Olsen
Brevard Wireless
(321) 205
...@ligowave.com
Sent: Tuesday, December 29, 2009 11:08 AM
To: WISPA General List wireless@wispa.org
Subject: Re: [WISPA] domain spam attack - JoeJob
You can implement the use of SPF records in your dns/mx settings. This
will tell mail servers which use SPF checking (which many do) to only
allow mail from your
or something like that.
Nick Olsen
Brevard Wireless
(321) 205-1100 x106
From: Matt Hardy mha...@ligowave.com
Sent: Tuesday, December 29, 2009 11:08 AM
To: WISPA General List wireless@wispa.org
Subject: Re: [WISPA] domain spam attack - JoeJob
You
: Re: [WISPA] domain spam attack - JoeJob
I use MailScanner http://www.mailscanner.info/ . It allows you to put a
watermark on all messages leaving your mailserver. If a bounce come in
without the watermark , it trashes it . works like a charm for exactly
that.
Terry
- Original
authentication which seems to work very well.
Richey
-Original Message-
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
Behalf Of Tom DeReggi
Sent: Tuesday, December 29, 2009 1:48 PM
To: WISPA General List
Subject: Re: [WISPA] domain spam attack - JoeJob
11 matches
Mail list logo