Hi Mike, I'm sorry, but I did include the headers (out of the spoolfile). I contacted kde and they had th explanation below and later talking to my sys admin at my university they concurred. Greetings, Nash ---------------------------------------------------------------------------------------------- ##########<included discussion with kde>################### Great! Thanks for the info! I believe solo.cs.vu.nl is using the UW IMAP pop server homepage http://www.washington.edu/imap/ (yes it does pop as well as imap). We use the same pop server at my workplace (and have many KMail users experiencing no problems), but here we use version v7.64, while solo.cs.vu.nl uses v4.39. In my opinion the version of UW IMAP used at solo.cs.vu.nl (v4.39) is buggy, it sometimes returns bogus data in response to the UIDL command. This bug is fixed in v7.69 of the UW IMAP and if you can convince the sys admin to upgrade your problem should be fixed. Don. On Thursday 14 June 2001 18:49, Nash Hoogwater wrote:
Hi Don,
I pop 2 servers: my own (postfix 20001212-4), this one receives mail from pop.planet.nl (ident: iPlanet Messaging Multiplexor version 5.1) via fetchmail and I pop solo.cs.vu.nl, but I can't get an identification string from it. I also use gotmail to get hotmail. The problem here lies within solo.cs.vu.nl because I have a filter-rule that places these mails in a separate folder ("to or CC contains emailadres transfer to foldername"). This is the place where this mail showes up. So as far I can see, this must be the troubling server. However, this is a server from a university and I talked to the systems administrator there and he thinks it could be a corrupt mailbox. Strange thing is of course that I do receive the mail, so there pop server could be misconfigured....
Hope I could be of some help.
Greetings,
Nash
On Thursday 14 June 2001 16:38, you wrote:
This indicates your pop server does not properly implement the UIDL command, (rather than a KMail bug existing)
If possible please manually telnet to the pop server and supply us with the identification string of the pop server.
Don.
On Monday 11 June 2001 13:42, nrhoogwater@planet.nl wrote:
Package: kmail Version: 1.2 (using KDE 2.1.1 ) Severity: normal Installed from: SuSE RPMs Compiler: gcc 2.95.2 19991024 OS: Linux OS/Compiler notes: Not Specified
I have received a very strange mail, upon which I couldn't receive mail anymore and when checking manually, kmail crashed. The mail I received looked like this:
Content-Type: Status: R X-Status: N
1 3b13ce2000000001 2 3b13ce2000000002
There were almost no headers as you can see and the body contained only 2 lines of rubbish. The date was 1 january 1970 00:59:59. Someone on a mailinglist confirmed the problem with kmail from KDE 2.0, but he received it after a crash from kmail.
(Submitted via bugs.kde.org)
_______________________________________________ Kmail Developers mailing list Kmail@master.kde.org http://master.kde.org/mailman/listinfo/kmail
##########<end included discussion with kde>################### ---------------------------------------------------------------------------------------------- On Monday 11 June 2001 03:44, you wrote:
Nash Hoogwater wrote:
Hi list,
I got some very strange mail a few minutes ago and a week ago also. Maybe someone can help me with this.
The mail doesn't contain a reply-adres, subject and almost no headers. The date is 1 january 1970 00:59:59. I have pasted the headers and text below. The text is also very strange as you can see.
Well, you have provided no headers. the from: to: is not the headers.
The contents looks like a spammer trying to scope if your email address can be used as a bcc relay. Spammers try to find victims that allow bcc spam, i.e. they send you an email and bcc a couple of hundred others on it. Your mail server might honor the bcc and help the spammer.
That's to me a sign that the spammer community is running out of open relays. Now they try the 'cc' and 'bcc' route.
To the recipients, it would look as if you had sent an email with them on the 'cc' or 'bcc' list. That's user level relaying.
The spammer expects a copy of this email, coming from you, and containing the pointers as text. Since they explore thousands of accounts, this return code identifies your email address. Then you will get emails with spam contents from them, and cc or bcc thousands of others, coming from your email address, if your email server allows for that.
They look for systems where a user can send email to an unlimited number of recipients.
Mike
-------------------------------------------------
Content-Type: Status: R X-Status: N
1 3b13ce2000000001 2 3b13ce2000000002
----------------------------------------------------
Someone??? Any idea???
Greetings,
Nash
-- To unsubscribe, e-mail: suse-security-unsubscribe@suse.com For additional commands, e-mail: suse-security-help@suse.com