On Fri, 28 Jun 2002, Smitty wrote:
> I understand. Actually, could an open relay also be used by a malicious
> hacker to relay a DOS attack?
Yes -- the technique would to be so set up a N stage open
relay source routed loop, and let it bounce around the loop
until it bounce returned, growing in size as it went.
-- or forged sender death threats to a third party, or to
anonymously and deniably transfer child pornography.
Substitute the bad example of your choice here.
With SMTP-AUTH, there is no good excuse for running an open
relay. SMTP-AUTH allows an upstream to receive email from its
authorized senders for relay, and from no-one else.
-- Russ Herrold
This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 13:07:49 EDT