On Tuesday, September 16, 2003, at 10:20 PM, David F. Skoll wrote:
For now, I suggest just waiting and seeing. Once a large number of spammers
start sending mail from faked domains, the machine 64.94.110.11 will be
rather busy (to put it mildly) handling all the bounces.
Verisign have more-or-less set themselves up for a distributed DoS attack
with this move.
it all sounds very messy, but, i'm wondering... how was it allowed to happen?
..S.
On Tuesday, September 16, 2003, at 09:33 PM, Robert Collins wrote:
On Tue, 2003-09-16 at 21:21, Martin wrote:
this also breaks tests used in antispam configurations (ie. postfix's reject_unknown_sender_domain)
So, any bets on how much the spammers paid verisign to do this?
-- SLUG - Sydney Linux User's Group - http://slug.org.au/ More Info: http://lists.slug.org.au/listinfo/slug