email spoofing
Res
res at ausics.net
Thu Jun 14 07:08:09 IST 2007
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
NotDashEscaped: You need GnuPG to verify this message
On Wed, 13 Jun 2007, Alex Neuman wrote:
>> I will always allow all of our IP ranges for relay on the cust-out-smtp's
>> as there is nothing at all wrong with doing so, so long as you don't add in
>> IP ranges that aren't your own, and since no network competently setup
>> routes RFC1918 addresses, its moot point.
>>
>>
> The F point, to use your own terms, is to avoid (read: make it more difficult
> to happen) spam zombies spewing stuff out of your network and getting you
> blacklisted. Most spam zombies will not authenticate - therefore, the e-mail
> won't leave your network. This, combined with a firewall policy that only
> allows port 25 traffic on your own servers can mitigate a spam zombie problem
> before it begins.
How many IP ranges are you responsible for? certainly not a major network.
Blocking outgoing 25 is also not an acceptable choice in this part of the
world, unless all major carriers do it, which wont happen because the
moment some do the others use that as a customer sales point.
We have very little outgoing spam issues, (I say very little because to
say we have none, would be very nieve, everybody has it, no mater how good
our networks are with inplace ACL's policies etc).
We had far more when we used smtp auth. If a customer gets their IP
blacklisted, so be it, better that then our cust out servers RBL'd
affecting countless thousands.
--
Cheers
Res
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFGcNtJsWhAmSIQh7MRAtQEAKCm695OD4KatqsatJtS/iu7OF6uCwCfWwda
+lYr2Z66rEMGSZQfRClbKzg=
=LRm/
-----END PGP SIGNATURE-----
More information about the MailScanner
mailing list