Hi,
Which got me thinking that t-mobile must be
*monitoring* or even
*proxying* the connection and chopping it off once it threatens
to become encrypted and unmonitorable.
With that in mind a bit of googling led to:
http://support.t-mobile.co.uk/help-and-support/index?page=support&cat=M…
which I think explains it.
Intersting! They seem to at least have good intentions.
However, I can see that spammers would use botnets to submit spam to
their intended victims on port 25, but I can't see why they'd use the
submission ports.
Has anyone got any ideas?
OTOH, I can see why a carrier might write a policy that forbids all
unauthenticated SMTP for T-Mobile's stated reasons and how that might be
interpreted by the implementors to mean all ports that carry SMTP or its
variants.
Regards,
@ndy
--
andyjpb(a)ashurst.eu.org
http://www.ashurst.eu.org/
0x7EBA75FF