Funny 220 response code...
Mike O'Dell
mo at ccr.org
Fri Mar 1 21:54:28 CST 2013
so is it really a C64? i've been told there is a functional TCP stack
for the C64.
it runs SLIP out the serial port.
-mo
On 3/1/13 7:35 PM, Howard Cunningham wrote:
>
> I spend much of my day looking into various email problems for our
> customers. I was working on one today and came across an interesting
> log entry.
>
> When our server sends a message and initial connection is made and the
> remote sends out a "220" SMTP response code. Usually it's just the
> official host name of the server, but some send out all kinds of spam
> and security warnings. Some US Government servers give out a couple of
> pages of warnings via a 220 code. Nobody ever sees these codes unless
> they have access to the server logs or manually telnets to the
> server... the code is not included in a message header. Anyway to get
> to the point... a user needed to know if a message was actually
> delivered so I checked the log (and it was delivered). The 220 SMTP
> response code from whoever runs the server made me laugh:
>
> 13:12:01 [41241] Connection to 64.136.173.100:25 from 72.9.X.X:63739
> succeeded (Id: 51)
> 13:12:08 [41241] RSP: 220 **** COMMODORE 64 BASIC V2
> **** 64K RAM SYSTEM @
> 38911 BASIC BYTES FREE READY.
>
>
>
>
>
>
>
> _______________________________________________
> Tacos mailing list
> Tacos at amrad.org
> https://amrad.org/mailman/listinfo/tacos
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://amrad.org/pipermail/tacos/attachments/20130301/022ba392/attachment.html>
More information about the Tacos
mailing list