Re: Unusual spam recently - hummm - postprocess

2004-06-04 Thread Brett Carrington
On Sat, Jun 05, 2004 at 12:23:14AM +0200, Bernd Eckenfels wrote:
 In article [EMAIL PROTECTED] you wrote:
  It's possible you're taking that fact into account:  I'd be curious to
  hear how you (or others) are ensuring that such bounces go somewhere
  appropriate.
 
 Well, fisrt of all, I accept mail for outgoing relay only from verified
 sources, this includes SMTP AUTH or based on ip address. This is of course
 not 100% secure. And second, you should try to not generate bounces. This
 includes spam rejects, unknown mailboxes and virus alerts. All those must be
 rejcted on the smtp level. This is all one can do in his own local
 responsibility.
 
 For backup MX or centralized mail gateways it is therefore a matter of good
 service to do all those rejections at the smtp level, which might involve
 replicated addressbooks or even pipelining.
 
 A lot of organisations forget to include their backup mx into their mail
 concept and are the main reaons for bounce-floods caused by malware or
 faked-sender spam. (of course with open relays it does not help if you do
 not bounce, but those are note the biggest source of spam). Direct delivery
 from dialups or open proxies are much more common, at least for the large
 mail providers.
None of this (and the rest of the thread too, not picking on anyone in
particulary) has much to do with Debian-security. Pehaps there is a more
general place this thread can be taken.


pgpOcbYht1Sk4.pgp
Description: PGP signature


Re: Unusual spam recently - hummm - postprocess

2004-06-04 Thread Brett Carrington
On Sat, Jun 05, 2004 at 12:23:14AM +0200, Bernd Eckenfels wrote:
 In article [EMAIL PROTECTED] you wrote:
  It's possible you're taking that fact into account:  I'd be curious to
  hear how you (or others) are ensuring that such bounces go somewhere
  appropriate.
 
 Well, fisrt of all, I accept mail for outgoing relay only from verified
 sources, this includes SMTP AUTH or based on ip address. This is of course
 not 100% secure. And second, you should try to not generate bounces. This
 includes spam rejects, unknown mailboxes and virus alerts. All those must be
 rejcted on the smtp level. This is all one can do in his own local
 responsibility.
 
 For backup MX or centralized mail gateways it is therefore a matter of good
 service to do all those rejections at the smtp level, which might involve
 replicated addressbooks or even pipelining.
 
 A lot of organisations forget to include their backup mx into their mail
 concept and are the main reaons for bounce-floods caused by malware or
 faked-sender spam. (of course with open relays it does not help if you do
 not bounce, but those are note the biggest source of spam). Direct delivery
 from dialups or open proxies are much more common, at least for the large
 mail providers.
None of this (and the rest of the thread too, not picking on anyone in
particulary) has much to do with Debian-security. Pehaps there is a more
general place this thread can be taken.


pgpXDZTqUymGy.pgp
Description: PGP signature


[no subject]

2003-03-08 Thread Brett Carrington
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
subscribe
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (Darwin)
iD8DBQE+agytmCMDkFhFYMcRAu/rAJ0WB3HhiLR9g6d6NdAG4cjQJ/c8zwCeMMtu
syVIs5rKrSBtaoLB0k8PQUA=
=hcxo
-END PGP SIGNATURE-
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


[no subject]

2003-03-08 Thread Brett Carrington

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

subscribe
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (Darwin)

iD8DBQE+agytmCMDkFhFYMcRAu/rAJ0WB3HhiLR9g6d6NdAG4cjQJ/c8zwCeMMtu
syVIs5rKrSBtaoLB0k8PQUA=
=hcxo
-END PGP SIGNATURE-