... with messages from an "Originator" named <>. I dont have any users with this <> as a name. furthermore, the "Outbound messages Awaiting Delivery" que keeps filling up.
OY! This topic has been hashed to death. Do a search about the myseterious <> and you will find many answers.
The <> is a RNDR attack, the spammer does a reverse lookup on your server to try and do spamming..its more of an annoyance than anything. Exchange 5.5 cannot stop against RNDR attcks.
Thank you, Dya for the information. I"ll look through this site for <> and see what comes up. Sorry to keep the topic alive though....my initial search didn't find any answers.
MS just recently issued a hotfix for Exchange 5.5 that now allows control over the generation of NDRs - should really help in stopping the reverse NDR spam attacks.
I guess it's bad news for the 3rd-party vendors that were making a killing with this issue, though.
Yeah, I had to talk to my technet online help guy to obtain the fix, I've got it. They caution me as it has not been regression tested..I'm reluctant to trying it in my production environment and my lab has exchange 2003 in it.
I was sent this hotfix by MS yesterday and installed it last night. It looks like its working fine right now. No NDR's are showing up in this folder that are not legitimate.
I set the SuppressNDROptions to 10 (do not generate NDR's)
I installed this Hotfix yesterday and it is working fine. We were generating 7000 - 9000 queued NDR's per day and today we are down to 1 and this looks genuine.
I have experimented with the SuppressNDROptions and found setting the Dword value to 1 works well for us since the NDR's get generated, but not delivered by the IMS. This means that all our exchange users get NDR's for anything originated by them and found to be undeliverable, but nothing gets sent to the internet when mail arrives for unknown addresses.
The 10 value gives no NDR's at all, so exchange users do not get any notification of undeliverable mail.
One point I also noticed when changing the Dword value, it appeared to be necessary to restart the IMS for the change to show through although Microsoft don't mention this.
The value of 100 is the most extreme form of lockdown for all the system-generated messages. It differs from the value of 10 becaue not every system-generated message is an NDR - some of them are Read Recipits and some are Delivery Reports. A value of 10 will suppress the generation of NDRs but still generate RR & DRs; a value of 100 will stop all NDRs, RRs and DRs.
I would have thought a value of 10 is sufficient for most people at the moment - ReverseRR and ReverseDR attacks haven't got the same appeal to a hacker as a ReverseNDR attck, as (unlike the NDR) a DR and RR don't normally return the content of the message with them, so are useless to someone trying to send spam (although this doesn't prevent them from being used for a denial of service attack).
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.