Funny 220 response code...
Howard Cunningham
howardc at macrollc.com
Fri Mar 1 18:35:26 CST 2013
I spend much of my day looking into various email problems for our customers. I was working on one today and came across an interesting log entry.
When our server sends a message and initial connection is made and the remote sends out a "220" SMTP response code. Usually it's just the official host name of the server, but some send out all kinds of spam and security warnings. Some US Government servers give out a couple of pages of warnings via a 220 code. Nobody ever sees these codes unless they have access to the server logs or manually telnets to the server... the code is not included in a message header. Anyway to get to the point... a user needed to know if a message was actually delivered so I checked the log (and it was delivered). The 220 SMTP response code from whoever runs the server made me laugh:
13:12:01 [41241] Connection to 64.136.173.100:25 from 72.9.X.X:63739 succeeded (Id: 51)
13:12:08 [41241] RSP: 220 **** COMMODORE 64 BASIC V2 **** 64K RAM SYSTEM @ 38911 BASIC BYTES FREE READY.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://amrad.org/pipermail/tacos/attachments/20130301/b3edca9b/attachment.html>
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: ATT00001.txt
URL: <http://amrad.org/pipermail/tacos/attachments/20130301/b3edca9b/attachment.txt>
More information about the Tacos
mailing list