Funny 220 response code...

Robert Stratton bob at stratton.net
Mon Mar 4 16:51:16 CST 2013


Our own Mr. Seastrom had my all time favorite SMTP response on his mail servers, intended to dissuade people doing reconnaissance. Something to the effect of 

"451 xxx.xxx EXPN and VRFY are disabled, just send your damn mail."

--Bob S.
----- Original Message -----
> 
> 
> 
> 
> 
> 
> I spend much of my day looking into various email problems for our
> customers. I was working on one today and came across an interesting
> log entry.
> 
> When our server sends a message and initial connection is made and
> the remote sends out a "220" SMTP response code. Usually it's just
> the official host name of the server, but some send out all kinds of
> spam and security warnings. Some US Government servers give out a
> couple of pages of warnings via a 220 code. Nobody ever sees these
> codes unless they have access to the server logs or manually telnets
> to the server... the code is not included in a message header.
> Anyway to get to the point... a user needed to know if a message was
> actually delivered so I checked the log (and it was delivered). The
> 220 SMTP response code from whoever runs the server made me laugh:
> 
> 13:12:01 [41241] Connection to 64.136.173.100:25 from 72.9.X.X:63739
> succeeded (Id: 51)
> 13:12:08 [41241] RSP: 220 **** COMMODORE 64 BASIC V2 **** 64K RAM
> SYSTEM @ 38911 BASIC BYTES FREE READY.
> 
> 
> 
> 
> 
> 
> _______________________________________________
> Tacos mailing list
> Tacos at amrad.org
> https://amrad.org/mailman/listinfo/tacos
> 


More information about the Tacos mailing list