3 Of course on big university and corporate machines with hundreds of users, tracking down the actual person who originated the connection to port 25 may not be completely trivial. Dynamically assigned IP addresses also make finding out who forged mail difficult. |