>       Anyone have any ideas/suggestions as to what other steps could be
> done? 

  Disallow SMTP connects *to* (as opposed to *through*) their 
firewall?  You did seem to indicate that it is the firewall that is 
being used to relay, not the server....

  Of course, it's possible that what they have isn't an open SMTP 
relay, in the classic sense, but an open proxy that someone is using 
to hide the origin of some SMTP traffic.  Note that in *this* case, 
it can be used just as freely to hide the origin of other sorts of 
traffic, such as intrusion attempts.
  If the firewall/proxy cannot be configured so that its public 
interface will only accept traffic for the private network, it is a 
nuisance and a hazard to the rest of the Internet.

  There are a couple of different organizations which "black hole" 
spammers and spam relays.  Basically, when someone complains to them 
about a relaying system, they will typically send a warning to 
postmaster@...[*], and initiate a test to see if the system can be 
exploited as a relay.  If the test comes up positive, the system is 
added to their DNS server as a known relay.
  Subscribing sites typically point their mail servers at the black 
hole DNS servers, so that when they look for MX records or try to 
confirm a reverse-lookup, most requests get forwarded to "real" 
authoritative DNS servers, but systems in the blackhole database 
returns some known bad address like 127.0.0.2.

  [*] The warning email will usually lay out the complaint, the 
procedure for requesting a re-test (pass and you are taken out of the 
blackhole database), and pointers to resources on blocking relaying 
on different server software -- or links to webpages containing this 
information.
  Of course, there are several such blackhole groups, and the longer 
the relay is up, the greater the chance of being listed in more than 
one of them....

David Gillett


On 13 Jun 2001, at 12:03, rac wrote:

> Hi fellow geeks:
> 
>       I rarely post here and only do so if I have an issue that I've not seen
> very much on.  The issue is one of my customers having a mail spammer that
> won't stop.  This person is using the firewall as a mail relay spamming
> others while showing the source address of the spam as the firewall's IP
> address.
>       One of the solutions I have suggested to them is to put in deny rules
> blocking all of the known IP addresses that he/she is coming from.  They
> eventually have entered rules blocking a whole class A sub-net because the
> spammer keeps changing his IP address.  They also have been on the "Black
> Hole" spammers list since April and can't do enough to get off of it.  BTW,
> has anyone ever heard of the "Black Hole" spammers list?  I have heard of
> others but not this one.
> 
>       I have checked into the vulnerabilities list and their NT mail server is up
> to date on patches.
> 
>       Anyone have any ideas/suggestions as to what other steps could be done?
> 
> regards,
> RAC
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to