Kai Schaetzl wrote:

Michael Moyse wrote on Fri, 08 Jul 2005 17:55:32 +0100:

To me it looks like a duck and sounds like a duck I'm probably wrong and missing something here because I'm no expert so I'm happy to be enlightened.

Ok, I enlighten you ;-) I hope I'm not wrong. Now that I look again at the headers it turns out I was wrong as well, see below.

From the headers:

Received: (qmail 10812 invoked by uid 567); 5 Jul 2005 12:03:20 -0000 Received: from 65.33.195.76 by host1 (envelope-from <[EMAIL PROTECTED]>, uid 502) with qmail-scanner-1.25 (clamdscan: 0.86.1/967. spamassassin: 3.0.4. Clear:RC:0(65.33.195.76):SA:0(0.0/1.5):. Processed in 0.44071 secs); 05 Jul 2005 12:03:20 -0000 Received: from unknown (HELO ss) (65.33.195.76) by 0 with SMTP; 5 Jul 2005 12:03:19 -0000
65.33.195.76 = 76.195.33.65.cfl.res.rr.com !

Received: from vitalmex.com.mx (mail1.vitalmex.com.mx [148.223.241.181]) by 76.195.33.65.cfl.res.rr.com (Pastfix) with ESMTP id 0456EDBA28 for <[EMAIL PROTECTED]>; Tue, 05 Jul 2005 05:21:23 -0700
The mail went:
vitalmex -> Roadrunner (Po/astfix) -> boom-edv.de (qmail)
The last Received line looks forged (Pastfix), there's also no SMTP running at 76.195.33.65.cfl.res.rr.com (=no open/abusable relay). This suggests that the mail was sent out directly from that roadrunner account and the last Received plus all vitalmex stuff is completely forged. Also, a spammer which abused a Roadrunner account would obviously not send openly from his own MX and giving you a return-path which leads back to him.

So, what you actually have to block is .rr.com and not .vitalmex.com.mx or .mx. This mail would have never reached us, because we already block all of .rr.com :-)


Kai

Cool! Thanks for the explanation

Reply via email to