At 3:55 AM +0200 2002/08/17, Karsten W. Rohrbach wrote:

>>      Also, how do you handle echoes of echoes?  For example, if I
>>  forged e-mail as being from [EMAIL PROTECTED] and addressed that to
>>  [EMAIL PROTECTED] (or whatever), would this generate an endless loop?
>
>  X-Loop:

        Hmm.  If they send back the entire message as a forward (which 
would be reasonable), do you scan for this header in the body (i.e., 
in the forwarded part), or just in the headers of the message that 
you are receiving?


        Thanks again!

-- 
Brad Knowles, <[EMAIL PROTECTED]>

"They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety."
     -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++)>: a C++(+++)$ UMBSHI++++$ P+>++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP>+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+(++++) DI+(++++) D+(++) G+(++++) e++>++++ h--- r---(+++)* z(+++)

Reply via email to