TCP/IP V2R4 - Mail Spamming Issues/Solutions


Note: Support for TCP/IP Version 2 ended on 31 January, 2001.

The information that follows has been maintained for reference purposes only.

The maintenance cited here is available for TCP/IP V2R4 to help address mail spamming and other issues associated with the misuse of e-mail systems.

   Solutions for V2R4

  • APAR PQ04382 (available via PTF UQ27174) provides the following new SMTP configuration statements and functional support:

    • VerifyClient Statement - Provides Built-In or Exit-driven verification.
    • ForwardMail Statement - Provides an Exit-driven forward mail process.
    • SourceRoutes Statement - Provides the ability to disable source routing.

      Note!
      APAR PQ21487 (available via PTF UQ27422) further modifies the SourceRoutes statement support. Use this link to obtain more information about these changes.

    Notes

    • When PTF UQ27174 is ordered as corrective (COR) service, several TCP/IP V2R4 PTFs (which provide IBM Network Station server support) will be included as prerequisites for PTF UQ27174, due to the manner in which the TCP/IP V2R4 product has been packaged.

      Please see the available service application notes for TCP/IP APAR PQ04382 for information about actions that may be required if TCP/IP V2R4 IBM Network Station support is not already installed on your system.

    • For detailed information about the support provided by APAR PQ04382 and the above statements, consult the on-line documentation for this APAR.

  • APAR PQ05135 (available via PTF UQ06895) includes a mail originator's IP address in the "Received:" line that is added by SMTP to the beginning of mail headers.

  • APAR PQ06018 (available via PTF UQ13724) provides built-in client verification (HELO parameter validation). This support will include a warning in the mail header when the client host and the HELO information are known to be different, similar to:
       X-Warning: Host name and IP address do not match