Please don't respond to misconfigured away messages copying the mailing 
list.  Send a complaint to the site in question, and if it continues - to 
the list owner (which has been done for the current case.)  

The messages complaining about the away messages will soon start to be worse 
than the away messages themselves.  If you still can't stand the messages, 
then take responsibility for your inbox, and simply filter on the sender's 
address and send their messages to /dev/null.

If you're going to use away messages, ensure that they do not reply to 
traffic containing the "Precedence: bulk" message header.  All mailing list 
traffic should be bulk.

Finally, as has been pointed out before - think twice before you let 
50,000 of your closest friends and enemies know you're not around to hold 
down the fort.

Ob firewalls:  Has anyone done any work on Web-based authentication for 
machines that will then open dynamic filters for IPFilter or IPFW?  So 
that a user can authenticate, then be allowed time or traffic-based 
filtering for the address they authenticate from.  Ideally with 
server-pushed Web pages to notifiy of authentication expiry.  I'm looking 
for alternatives to allowing hosts on an external segement completely 
unrestricted access.  Also is NFR my best option for reporting on 
traffic on an external segment outside of a commercial sniffer product?

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to