telus bouncing complaints

  • Thread starter Thread starter Jason Wade
  • Start date Start date
J

Jason Wade

telus.net and telusplanet.net are bouncing all of my
abuse complaints about Swen virus messages.

They can manage to send virus-infected mail to me,
but they won't take mail from me?
 
telus.net and telusplanet.net are bouncing all of my
abuse complaints about Swen virus messages.

They can manage to send virus-infected mail to me,
but they won't take mail from me?

Yep, sure can, and would be harder to make sure they cut off Swen rather
than just cut off your complaints.

I dropped all of Telus's traffic in the firewall. No complaints. (I checked
my logs first...)

telus.blackholes.us or use their zone files on their web page.
 
Jason said:
telus.net and telusplanet.net are bouncing all of my
abuse complaints about Swen virus messages.

They can manage to send virus-infected mail to me,
but they won't take mail from me?

As a recent news release indicated, Telus is taking important steps to
protect their customers. They are filtering all mail on "Swen Virus."
 
telus.net and telusplanet.net are bouncing all of my
abuse complaints about Swen virus messages.

They can manage to send virus-infected mail to me,
but they won't take mail from me?

BTW... here are some telus blocks - not complete...

telus1 64.180.0.0 255.255.0.0
telus10 209.53.0.0 255.255.0.0
telus11 208.180.0.0 255.252.0.0
telus12 209.89.0.0 255.255.0.0
telus13 207.102.0.0 255.255.0.0
telus14 207.134.0.0 255.255.0.0
telus2 66.183.0.0 255.255.0.0
telus3 154.5.0.0 255.255.0.0
telus4 216.232.0.0 255.255.0.0
telus5 209.121.0.0 255.255.0.0
telus6 207.81.0.0 255.255.0.0
telus7 64.114.0.0 255.255.0.0
telus8 66.222.0.0 255.255.0.0
telus9 207.6.0.0 255.255.0.0

tom

Spamming this account signifies
your unqualified consent to a free security audit
 
BTW... here are some telus blocks - not complete...

telus1 64.180.0.0 255.255.0.0
telus10 209.53.0.0 255.255.0.0
telus11 208.180.0.0 255.252.0.0
telus12 209.89.0.0 255.255.0.0
telus13 207.102.0.0 255.255.0.0
telus14 207.134.0.0 255.255.0.0
telus2 66.183.0.0 255.255.0.0
telus3 154.5.0.0 255.255.0.0
telus4 216.232.0.0 255.255.0.0
telus5 209.121.0.0 255.255.0.0
telus6 207.81.0.0 255.255.0.0
telus7 64.114.0.0 255.255.0.0
telus8 66.222.0.0 255.255.0.0
telus9 207.6.0.0 255.255.0.0

For your list:

NetRange: 199.185.220.0 - 199.185.224.255
CIDR: 199.185.220.0/22, 199.185.224.0/24
NetName: EDTEL-PLANET
 
telus.net and telusplanet.net are bouncing all of my abuse complaints about Swen virus messages.
They can manage to send virus-infected mail to me, but they won't take mail from me?

Please post a sample "bounce" message, and the headers from a
virus-infected message.

It probably was something "transient" -- my E-mails to
<[email protected]>
do not bounce, and I get a follow-up "we have enforced our AUP"
message a few days later.

Note that some viruses, e.g., 'Swen', do *NOT* use the ISP's
mail-server.
So, unless the ISP blocks outgoing SMTP (port 25) connections from
their
customers' IP-addresses, there is no opportunity for the ISP to
virus-filter the message
before it reaches your ISP's mail-server.

P.S. TELUS offers *free* anti-virus software to all their ADSL
customers.
 
Please post a sample "bounce" message, and the headers from a
virus-infected message.

X used to munge the virus-sender's email address (partially ;) ).

Received: from priv-edtnes57.telusplanet.net ([199.185.220.240])
by mc1-f9.hotmail.com with Microsoft SMTPSVC(5.0.2195.6713);
Sat, 18 Oct 2003 23:31:07 -0700
Received: from wkoy ([205.206.202.161]) by priv-edtnes57.telusplanet.net
(InterMail vM.5.01.06.05 201-253-122-130-105-20030824)
with SMTP id <20031017171312.MDHP11861.priv-edtnes57.telusplanet.net@wkoy>;
Fri, 17 Oct 2003 11:13:12 -0600
Message-Id: <20031017171312.MDHP11861.priv-edtnes57.telusplanet.net@wkoy>
Return-Path: (e-mail address removed)
X-OriginalArrivalTime: 19 Oct 2003 06:31:08.0031 (UTC)
FILETIME=[9469D8F0:01C3960A]
It probably was something "transient" -- my E-mails to
<[email protected]>
do not bounce, and I get a follow-up "we have enforced our AUP"

my mails bounce.
message a few days later.

Note that some viruses, e.g., 'Swen', do *NOT* use the ISP's
mail-server.

swen uses.
So, unless the ISP blocks outgoing SMTP (port 25) connections from
their
customers' IP-addresses, there is no opportunity for the ISP to
virus-filter the message
before it reaches your ISP's mail-server.

P.S. TELUS offers *free* anti-virus software to all their ADSL
customers.

and MS offers *free* patches.

SO?
 
Please post a sample "bounce" message, and the headers from a
virus-infected message.

X used to munge the virus-sender's email address (partially ;) ).

Received: from priv-edtnes57.telusplanet.net ([199.185.220.240])
by mc1-f9.hotmail.com with Microsoft SMTPSVC(5.0.2195.6713);
Sat, 18 Oct 2003 23:31:07 -0700
Received: from wkoy ([205.206.202.161]) by priv-edtnes57.telusplanet.net
(InterMail vM.5.01.06.05 201-253-122-130-105-20030824)
with SMTP id <20031017171312.MDHP11861.priv-edtnes57.telusplanet.net@wkoy>;
Fri, 17 Oct 2003 11:13:12 -0600
Message-Id: <20031017171312.MDHP11861.priv-edtnes57.telusplanet.net@wkoy>
Return-Path: (e-mail address removed)
X-OriginalArrivalTime: 19 Oct 2003 06:31:08.0031 (UTC)
FILETIME=[9469D8F0:01C3960A]

Yes, a "direct-to-SMTP-server" piece of E-mail, bypassing the TELUS
SMTP-servers.
my mails bounce.

Please show an example.
swen uses.

OK. Bad example, but DUMARU does not. So?
and MS offers *free* patches.
SO?

So, it shows that TELUS is part of the solution, not part of the
problem.
 
Back
Top