Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Rick Troxel (rickhelix.nih.gov)
Date: Fri Apr 20 2001 - 13:51:40 CDT
At least the copies of this worm I've seen have a fixed From: header, so
they could be intercepted in postfix with its header_checks feature.
-- Rick Troxel rickhelix.nih.gov 301/435-2983 ///////////////////////////////////////////////////////////////// All effort and exertion put forth by man from the fullness of his heart is worship, if it is prompted by the highest motives and the will to do service to humanity. --Abdu'l-Baha
Today (04/20/01), Derrik Pates wrote:
dpates>No, I need to deny people from outside my network from dpates>sending such messages to my users. Interestingly, this is dpates>how the so-called "snowhite" work aimed at Windows systems dpates>propagates - it manages to send a <> as part of the 'MAIL dpates>FROM:', which makes it hard to filter. I've been using a dpates>procmail script, which catches the name of the attached dpates>file and bounces it that way, but the attachment name dpates>changes every so often, so this is not a really good dpates>solution either.
- To unsubscribe, send mail to majordomopostfix.org with content (not subject): unsubscribe postfix-users