>============================
>What is puzzling me is, AOL receives successfully, but does not deliver!

ok, your careful experiment duplicates the others' 
experiences.  Sorry, you'll have to share the Nobel Prize in AOL mail 
research.  vbg

>Isn't this unethical, even unlawful?

Since when does ethics or legalities apply to Internet?

>I wasn't able to get any explanation from AOL.

Your Nobel prize is on hold until further notice.

>The "[216.216.179.130] (may be forged)" message is I believe I don't have
>reverse DNS.

I KNOW you don't have your reverse setup, but AOL couldn't reject you 
because of that since 1000's of Internet mail server don't have their 
reverse set up.

So, it's very clear that AOL is accepting mail but not delivering it 
and not bouncing it.  And the same mail when relayed via another mail 
server is accepted and delivered.

When talking to customers, I think the only position to take is that 
our mail server delivered the mail to AOL and we have logs to prove 
it, so the mail delivery failure is internal to AOL.  sorreeee

There's not much we can do from the outside, how we (well, you 
people) who run your own DNS can try this test.

In your DNS, set up a spoofed zone for fake AOL.com, but with valid 
data you get from DNS lookups to AOL' NS's.  With your DNS as SOA and 
NS records, use a valid A record for www.aol.com and aol.com.  Set up 
the MX's using AOL's data:

;; ANSWER SECTION:
aol.com.                32m33s IN MX    15 za.mx.aol.com.
aol.com.                32m33s IN MX    15 zb.mx.aol.com.
aol.com.                32m33s IN MX    15 zc.mx.aol.com.
aol.com.                32m33s IN MX    15 zd.mx.aol.com.
aol.com.                32m33s IN MX    15 yb.mx.aol.com.
aol.com.                32m33s IN MX    15 yc.mx.aol.com.
aol.com.                32m33s IN MX    15 yd.mx.aol.com.
aol.com.                32m33s IN MX    15 ye.mx.aol.com.
aol.com.                32m33s IN MX    15 yg.mx.aol.com.
aol.com.                32m33s IN MX    15 yh.mx.aol.com.
aol.com.                32m33s IN MX    15 xa.mx.aol.com.
aol.com.                32m33s IN MX    15 xb.mx.aol.com.
aol.com.                32m33s IN MX    15 xd.mx.aol.com.

;; ADDITIONAL SECTION:
za.mx.aol.com.          32m33s IN A     152.163.224.26
zb.mx.aol.com.          32m33s IN A     152.163.224.58
zc.mx.aol.com.          29m33s IN A     152.163.224.88
zd.mx.aol.com.          29m33s IN A     152.163.224.122
yb.mx.aol.com.          29m33s IN A     205.188.156.97
yb.mx.aol.com.          29m33s IN A     205.188.156.98
yb.mx.aol.com.          29m33s IN A     205.188.156.99
yb.mx.aol.com.          29m33s IN A     205.188.156.100
yb.mx.aol.com.          29m33s IN A     205.188.156.101
ye.mx.aol.com.          29m33s IN A     205.188.158.25
xa.mx.aol.com.          29m33s IN A     64.12.136.57

Now, to force Imail to use a specific AOL MX, comment out all the 
MX's but one, and have Imail use this DNS to send mail to AOL. Run 
the test for each MX.  Maybe some MX gateways will let mail be 
delivered and you just run the DNS for AOL using these MX gateways.

If not, at least you've learned how to spoof DNS.

This is why "DNS spoofing" is so dangerous. If some black hat can 
spoof data in his cache, he can point the MX to his mail server and 
steal the mail. Of course, you never put any valuable information in 
Internet "postcard" mail, do you?

Len



http://BIND8NT.MEIway.com : Binary for ISC BIND 8.2.3 T9B for NT4 & W2K
http://IMGate.MEIway.com  : Build free, hi-perf, anti-spam mail gateways


Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/

Reply via email to