Re: Unusual spam recently - hummm - postprocess
On Sat, Jun 05, 2004 at 12:23:14AM +0200, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > It's possible you're taking that fact into account: I'd be curious to > > hear how you (or others) are ensuring that such bounces go somewhere > > appropriate. > > Well, fisrt of all, I accept mail for outgoing relay only from verified > sources, this includes SMTP AUTH or based on ip address. This is of course > not 100% secure. And second, you should try to not generate bounces. This > includes spam rejects, unknown mailboxes and virus alerts. All those must be > rejcted on the smtp level. This is all one can do in his own local > responsibility. > > For backup MX or centralized mail gateways it is therefore a matter of good > service to do all those rejections at the smtp level, which might involve > replicated addressbooks or even pipelining. > > A lot of organisations forget to include their backup mx into their mail > concept and are the main reaons for bounce-floods caused by malware or > faked-sender spam. (of course with open relays it does not help if you do > not bounce, but those are note the biggest source of spam). Direct delivery > from dialups or open proxies are much more common, at least for the large > mail providers. None of this (and the rest of the thread too, not picking on anyone in particulary) has much to do with Debian-security. Pehaps there is a more general place this thread can be taken. pgpXDZTqUymGy.pgp Description: PGP signature
Re: Unusual spam recently - hummm - postprocess
On Sat, Jun 05, 2004 at 12:23:14AM +0200, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > It's possible you're taking that fact into account: I'd be curious to > > hear how you (or others) are ensuring that such bounces go somewhere > > appropriate. > > Well, fisrt of all, I accept mail for outgoing relay only from verified > sources, this includes SMTP AUTH or based on ip address. This is of course > not 100% secure. And second, you should try to not generate bounces. This > includes spam rejects, unknown mailboxes and virus alerts. All those must be > rejcted on the smtp level. This is all one can do in his own local > responsibility. > > For backup MX or centralized mail gateways it is therefore a matter of good > service to do all those rejections at the smtp level, which might involve > replicated addressbooks or even pipelining. > > A lot of organisations forget to include their backup mx into their mail > concept and are the main reaons for bounce-floods caused by malware or > faked-sender spam. (of course with open relays it does not help if you do > not bounce, but those are note the biggest source of spam). Direct delivery > from dialups or open proxies are much more common, at least for the large > mail providers. None of this (and the rest of the thread too, not picking on anyone in particulary) has much to do with Debian-security. Pehaps there is a more general place this thread can be taken. pgpOcbYht1Sk4.pgp Description: PGP signature
[no subject]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 subscribe -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.1 (Darwin) iD8DBQE+agytmCMDkFhFYMcRAu/rAJ0WB3HhiLR9g6d6NdAG4cjQJ/c8zwCeMMtu syVIs5rKrSBtaoLB0k8PQUA= =hcxo -END PGP SIGNATURE-
[no subject]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 subscribe -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.1 (Darwin) iD8DBQE+agytmCMDkFhFYMcRAu/rAJ0WB3HhiLR9g6d6NdAG4cjQJ/c8zwCeMMtu syVIs5rKrSBtaoLB0k8PQUA= =hcxo -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]