ietf-822
[Top] [All Lists]

Re: authenticating the source of mail

2002-05-17 15:48:52


Keith Moore wrote:

I'll grant that the ORBS approach suffers from the same kind of
naivete.

You closed your open relay. Naive or no, it certainly worked for you.

-- 
Eric A. Hall                                        http://www.ehsco.com/
Internet Core Protocols          http://www.oreilly.com/catalog/coreprot/