You could set up a special gateway dedicated only to them. Put it on a timer
so it only runs during the day.
But you really have to solve the problem or help them to do that. Maybe they
would hire you as a consultant to do just that.
Presumably, you could check the logs to determine the originating IP and
track the source down that way. If not, then use process of elimination -
what is left on at night?
-d
----- Original Message -----
From: "Matti Haack" <[EMAIL PROTECTED]>
To: "Len Conrad" <[email protected]>
Sent: Tuesday, March 28, 2006 4:58 AM
Subject: Re[2]: [IMail Forum] SMTP-Relay / Auth only FROM valid email
Adresses
We are a SERVICE Provider, so we
want to provide a good service to our customers. After the first issue
from them, they cleaned up all Maschines, but the proplem reappered
two wekks later.
Maybe it is some mobile device which gets attached to their network.
So Yes, I shut down their service weeks ago. They told me, they
corrected the problem, I reactivated the account and after two weeks
it happend again... Unfortunatly they can't send from their DUP
Provider, as they force them to use the providers free eMail
Adress.
The main Problem is that this spammings normaly happens during night
time. So
I am looking for a method to prevent them (and other customers) to
start this again. When we detect it (kiwi-Syslog sends alarm), it is
normally
to late and our queue is filled with bounces which has to be removed
manually.
To mitigate this problem, I made a small script wich monitors the queue
size and send alarm messages, if the queue grows unusual.
As the from adress is faked to, we got masses of bounces. - And the
sender has no
idea what he did...
So do you have any Idea how to force users to a special "from:"
domain? Technical, not idiological...
With best regards
Matti Haack
I have some problem with the way IMAL (8.x) handles SMTP-Auth email. A
customer from us seems to have a compromised host, which sends Spam
evry two weeks or so trough their local gateway
tell them that you will not relay outbound mail that has been
submitted to their system without SMTP AUTH.
Since they are spamming you from a trusted IP, you show them your
logs and shut them off until they fix their system. In the meantime,
their own gateway can send directly to Internet and shift the problem
onto them.
- which is relayed over our IMAIL Server.
Their Mail server requires no authentification for their local hosts
to send mail
I'd be surprised if a mail-bot/trojan in a compromised machine is
doing SMTP AUTH to submit spam to their mail server. Their mail
server is more likely doing relay for addresses.
Len
To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
-
Matti Haack - Hit Haack IT Service Gmbh
Poltlbauer Weg 4, D-94036 Passau
+49 851 50477-22 Fax: +49 851 50477-29
http://www.haack-it.de
Dieses Dokument ist ausschliesslich fuer den Adressaten bestimmt.
Jegliche Art von Reproduktion, Verbreitung, Vervielfaeltigung,
Modifikation,
Verteilung und/oder Publikation dieser E-Mail-Nachricht ist untersagt,
soweit dies nicht ausdruecklich genehmigt wurde. Jegliche Haftung fur
Ansprueche, die aufgrund der Kommunikation per E-Mail begruendet
werden koennten, ist ausgeschlossen, soweit der Haftungsausschluss
gesetzlich zulaessig ist.
-- Ausgehende E-Mail wurde auf Viren gescannt --
To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/