On Tue, Mar 09, 1999 at 09:55:06AM -0600, [EMAIL PROTECTED] wrote:
> Rick McMillin <[EMAIL PROTECTED]> writes on 9 March 1999 at 09:30:22 -0600
>  > OK, by now I'm sure you've all heard about this thread that's
>  > been going around about this program that connects to your
>  > SMTP server, runs through a built in dictionary of addresses
>  > verifying the validity of each address.  It then takes the results
>  > and sends emails to the ones it knows exists.  It does something
>  > like this.
> 
> And qmail gives it a positive on every name it tries.  This has
> up-sides and down-sides.  If everybody did this, the attack wouldn't
> work at all and wouldn't be tried.  It's sort-of like building one of
> those infinite mazes of web-pages with invalid addresses on every page
> to try to pollute the mailing lists of people harvesting web
> addresses.

I may be giving them too much credit, but it's conceivable that this software
considers a 100 percent positive rate as meaning what it does mean--that the
results are meaningless. If that's the case, then qmail is immune to this
attack.

Chris

Reply via email to