Re: UK gov get onboard the security notification train

2005-02-24 Thread Martin Hepworth

Also it's shame there's no sign-up confirmation email/SMS on these.
Heck should I wish I could get all the spam trojans to sign up to this 
with interesting email/mobile-numbers and really annoy alot of people.

Sigh - reinventing the wheel (badly) again. Wonders what's wrong with 
MailMan (etc) and just patch in an SMS system to it...???

--
Martin Hepworth
Snr Systems Administrator
Solid State Logic
Tel: +44 (0)1865 842300
Colin Johnston wrote:
See
http://news.bbc.co.uk/1/hi/technology/4291005.stm
Now maybe if we can persude UK Gov to configure mailing lists correctly to
not send virus content before it is scanned then maybe we can all sleep safe
at night :)
Colin Johnston
**
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote confirms that this email message has been swept
for the presence of computer viruses and is believed to be clean.
**


Re: UK gov get onboard the security notification train

2005-02-24 Thread Simon Dick

On Thu, 2005-02-24 at 09:43 +, Alex Bligh wrote:
 
 
 --On 24 February 2005 09:37 + Martin Hepworth 
 [EMAIL PROTECTED] wrote:
 
  Also it's shame there's no sign-up confirmation email/SMS on these.
 
 I am betting they don't PGP sign anything, so that it's entirely
 possible for some miscreant to provide spoof attacks.

On the other hand, they let you specify a ITSafe word which I gather
they put in all the subjects, personally I'd prefer PGP though.

-- 
Simon Dick [EMAIL PROTECTED]



Who is watching the watchers?

2005-02-24 Thread Michael . Dillon

Former chief privacy officer of Gator has been appointed to the Data 
Privacy and Integrity Advisory Committee of the Department of Homeland 
Security.

http://www.salon.com/politics/war_room/2005/02/23/gator/index.html?source=RSS


--Michael Dillon



Re: Who is watching the watchers?

2005-02-24 Thread Daniel Golding


Was it part of a plea agreement?!

Maybe this is like the FBI employing forgers and burglars to get advice on
stopping crime?

Well, probably not... :(

- Dan

On 2/24/05 9:30 AM, [EMAIL PROTECTED]
[EMAIL PROTECTED] wrote:

 
 Former chief privacy officer of Gator has been appointed to the Data
 Privacy and Integrity Advisory Committee of the Department of Homeland
 Security.
 
 http://www.salon.com/politics/war_room/2005/02/23/gator/index.html?source=RSS
 
 
 --Michael Dillon
 






FW: [MPLS-OPS]: Toolbox for Traffic Engineering freely available

2005-02-24 Thread Irwin Lazar

Thought I'd pass this along in case anyone is interested:

-- Forwarded Message
 From: Skivee Fabian [EMAIL PROTECTED]
 Date: Thu, 24 Feb 2005 16:22:13 +0100 (CET)
 To: [EMAIL PROTECTED]
 Subject: [MPLS-OPS]: Toolbox for Traffic Engineering freely available
 Resent-From: [EMAIL PROTECTED]
 Resent-Date: Thu, 24 Feb 2005 10:22:29 -0500
 
 
 The first release of the open-source TOolbox for Traffic Engineering
 Methods (TOTEM) is now freely available.
 
 This toolbox integrates a series of tools for intra-domain and
 inter-domain traffic engineering of IP and MPLS networks. It allows
 network operators to traffic engineer their network, and also researchers
 to compare their techniques to methods already in the toolbox.
 
 Release 1.0 includes features like:
- IP metric optimisation
- MPLS LSP path computation supporting preemption and DiffServ-TE
- MPLS backup LSP path computation with bandwidth sharing
- BGP decision process simulations
- Flexible simulation scenarios such as link/node failures
- Interoperable XML format for topology and traffic matrix representation
- ...
 
 You can find additional information, binaries, source codes and user guide
 at:
http://totem.run.montefiore.ulg.ac.be
 
 TOTEM project home page: http://totem.info.ucl.ac.be/
 
 Best regards,
 
 The TOTEM team
 
 PS: To be informed about new releases of the toolbox, subscribe to our
 mailing list at
 http://mailman.info.ucl.ac.be/mailman/listinfo/totem-announce
 
 -- 
 Making the impossible possible, the possible easy, the easy elegant ...
 
 Fabian Skivee Tel :   +32 4 366 26 10
 Universite de Liege   Secr :  +32 4 366 26 91
 Reseaux Informatiques Fax :   +32 4 366 29 89
 Research Unit in Networking (RUN) [EMAIL PROTECTED]
 Institut d'Electricite Montefiore, B 28, B-4000 LIEGE 1, BELGIUM
 
 CoNEXT 2005 - The E-NEXT NoE conference - http://www.co-next.net/
 
 ---
 The MPLS-OPS Mailing List
 Subscribe/Unsubscribe:  http://www.mplsrc.com/mplsops.shtml
 Archive: http://www.mplsrc.com/mpls-ops_archive.shtml

-- End of Forwarded Message



AOL scomp

2005-02-24 Thread Edward B. Dreger

Can AOL's this is spam feedback loop be abused with a single person
responding to a single message many, many times?  Inquiring minds want
to know.


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.



Re: AOL scomp

2005-02-24 Thread Jeff Wheeler
On Feb 24, 2005, at 11:52 AM, Edward B. Dreger wrote:
Can AOL's this is spam feedback loop be abused with a single person
responding to a single message many, many times?  Inquiring minds want
to know.
No it can't be abused [by the average AOL user] - when you click the 
Report Spam button the message disappears from your mailbox.  I 
tested this from within AOL version 10.3 for Mac OS X.

--
Jeff Wheeler
Postmaster, Network Admin
US Institute of Peace


Re: AOL scomp

2005-02-24 Thread Matt Taber
It's too bad that about 1/3 of the reported mails are valid opt-in lists.
Ahh well -- this is a nice mechanism that AOL provides, IMO.
Matt Taber
Network Admin
WMIS Internet - www.wmis.net
--
If you really want something in this life, you have to work for it. 
Now, quiet! They're about to announce the lottery numbers...
- Homer Simpson


Jeff Wheeler wrote:
On Feb 24, 2005, at 11:52 AM, Edward B. Dreger wrote:
Can AOL's this is spam feedback loop be abused with a single person
responding to a single message many, many times?  Inquiring minds want
to know.

No it can't be abused [by the average AOL user] - when you click the 
Report Spam button the message disappears from your mailbox.  I tested 
this from within AOL version 10.3 for Mac OS X.

--
Jeff Wheeler
Postmaster, Network Admin
US Institute of Peace




Re: AOL scomp

2005-02-24 Thread Valdis . Kletnieks
On Thu, 24 Feb 2005 12:28:58 EST, Matt Taber said:
 It's too bad that about 1/3 of the reported mails are valid opt-in lists.

Proof that any network management or security or anti-spam scheme that implies
end users with functional neurons is doomed from the get-go.



pgpLOEVtdkX3M.pgp
Description: PGP signature


Re: Who is watching the watchers?

2005-02-24 Thread Paul Vixie

  Former chief privacy officer of Gator has been appointed to the Data
  Privacy and Integrity Advisory Committee of the Department of Homeland
  Security.
  
  http://www.salon.com/politics/war_room/2005/02/23/gator/index.html

as president bush (jr) said on tv in the days following 9/11,
america is open for business!
-- 
Paul Vixie


Re: AOL scomp

2005-02-24 Thread chuck goolsbee

It's too bad that about 1/3 of the reported mails are valid opt-in lists.
The other 1/3rd are actual spam, but legitimately forwarded as the 
user requested from a personal or business domain to an AOL account. 
Any server in the path gets tagged as a spam source.

And the remaining third seems to be just plain old normal personal 
correspondence ... which I find weird.

Ahh well -- this is a nice mechanism that AOL provides, IMO.
Agreed, though maybe they should look at SpamAssasin or Postini. Take 
their end-users out of the filtering mechanism somehow.

--chuck
--
__
There's only so much stupidity you can compensate for;
there comes a point where you compensate for so much
stupidity that it starts to cause problems for the
people who actually think in a normal way.
-Bill, digital.forest tech support


Re: Who is watching the watchers?

2005-02-24 Thread Eric Brunner-Williams in Portland Maine

   Former chief privacy officer of Gator has been appointed to the Data
   Privacy and Integrity Advisory Committee of the Department of Homeland
   Security.
   
   http://www.salon.com/politics/war_room/2005/02/23/gator/index.html
 
 as president bush (jr) said on tv in the days following 9/11,
 america is open for business!

You don't want to know who is the CPO for DHS. Its FUBAR all the way up.

Eric


Re: AOL scomp

2005-02-24 Thread Michael Loftis

--On Thursday, February 24, 2005 10:18 AM -0800 chuck goolsbee 
[EMAIL PROTECTED] wrote:


It's too bad that about 1/3 of the reported mails are valid opt-in lists.
The other 1/3rd are actual spam, but legitimately forwarded as the user
requested from a personal or business domain to an AOL account. Any
server in the path gets tagged as a spam source.
Actually only the server that connected to AOL and relayed the mail into 
them.  I have this same kind of gripe/complaint.  Only for me about 2/3rds 
of my scomp reports are this.  The other third are the below...only vry 
rarely is an actual spam reported from our system, except in the case of 
where we occasionally have a fraudulent signup come through and then start 
spamming.

And the remaining third seems to be just plain old normal personal
correspondence ... which I find weird.
This happens because, atleast in many versions I don't know about 
currently, DELETE and SPAM buttons were right next to eachother, causing 
mis-clicks.



RE: AOL scomp

2005-02-24 Thread andrew2


 The other 1/3rd are actual spam, but legitimately forwarded as the
 user requested from a personal or business domain to an AOL account.
 Any server in the path gets tagged as a spam source.
 
 Actually only the server that connected to AOL and relayed
 the mail into them.  I have this same kind of
 gripe/complaint.  Only for me about 2/3rds of my scomp
 reports are this.  

I see the same thing.  At least 2/3rds are spam forwarded along as
described above.  I have to give some credit to AOL WRT handling that
type of situation -- they're much better than MSN/Hotmail who do not
have a whitelist or feedback loop and simply stop accepting mail for 12+
hours from any server that reaches a particular spam threshhold.  They
refuse to do anything about it, even after trying to explain the
situation because It's the Symantec software that does it.  Of course
that fact they're causing affected servers to get their mail queues
backed up with mail awaiting delivery to MSN/Hotmail isn't their problem
either.  Grrr...

Andrew



RE: AOL scomp

2005-02-24 Thread Drew Weaver

Postini is my friend :-)

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
chuck goolsbee
Sent: Thursday, February 24, 2005 1:19 PM
To: [EMAIL PROTECTED]
Subject: Re: AOL scomp


It's too bad that about 1/3 of the reported mails are valid opt-in
lists.

The other 1/3rd are actual spam, but legitimately forwarded as the 
user requested from a personal or business domain to an AOL account. 
Any server in the path gets tagged as a spam source.

And the remaining third seems to be just plain old normal personal 
correspondence ... which I find weird.

Ahh well -- this is a nice mechanism that AOL provides, IMO.

Agreed, though maybe they should look at SpamAssasin or Postini. Take 
their end-users out of the filtering mechanism somehow.

--chuck


-- 

__
There's only so much stupidity you can compensate for;
there comes a point where you compensate for so much
stupidity that it starts to cause problems for the
people who actually think in a normal way.

-Bill, digital.forest tech support


Re: AOL scomp

2005-02-24 Thread Edward B. Dreger

All,


Thanks for the many on- and off-list replies.  Things begin to make a
bit more sense.

We recently began hosting a list with several AOL subscribers, and this
week's complaint volume is five times what it was last week.  With one
complaint per ~4 AOL subscribers (who are but 4.6% of the total list)
this time around, and _zero_ complaints from anywhere else, I thought
something was amiss.  'tis a pity AOLers can't tell delete from
unsubscribe from spam.

Time to VERPify the list and unsubscribe people mercilessly. *grumble*

On the cynical side:  Has anyone considered an inverted blacklist --
i.e., a _destination_-based mail blocking mechanism?  Rejecting mail to
parties with excessive bogus complaint rates certainly might simplify
life for those tasked with handling abuse incidents. ;-)

On a more positive note:  One AOL user unsubscribed correctly.  I don't
mean to bash all AOLers... just the ones who are a bit... confused.


Thanks to all,
Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.



Re: AOL scomp

2005-02-24 Thread Joe Maimon

chuck goolsbee wrote:

It's too bad that about 1/3 of the reported mails are valid opt-in 
lists.

The other 1/3rd are actual spam, but legitimately forwarded as the 
user requested from a personal or business domain to an AOL account. 
Any server in the path gets tagged as a spam source.
I believe one has an extra duty to be as strict as possible about 
accepting email to be forwarded to external parties:

Read: Setup for every usuable blocklist, including you own, which 
rejects email outright. And spamassassin setup to reject any reasonable 
low FP score threshold. And none of that  tag em all and let the user 
sort it out business.

Its not legitimate to cover your eyes and forward probable garbage to 
someone else. You want it on your system, thats your decision. AOL 
blocklisting high percentage garbage senders, including those merely 
forwarding, is perfectly valid in my book.

To blocklist all servers in the path or just the most recent one is a 
local decision


RE: AOL scomp

2005-02-24 Thread Edward B. Dreger

 Date: Thu, 24 Feb 2005 13:46:20 -0500
 From: [EMAIL PROTECTED]

 I see the same thing.  At least 2/3rds are spam forwarded along as
 described above.  I have to give some credit to AOL WRT handling that
 type of situation -- they're much better than MSN/Hotmail who do not
 have a whitelist or feedback loop and simply stop accepting mail for
 12+ hours from any server that reaches a particular spam threshhold.

We now refuse to forward mail that's almost certainly spam.  Users may
POP it, but forwarding is out.

Jared [if you're listening], care to provide an scomp POC-type
database on puck?


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.



Re: AOL scomp

2005-02-24 Thread Edward B. Dreger

JM Date: Thu, 24 Feb 2005 14:17:24 -0500
JM From: Joe Maimon

JM To blocklist all servers in the path or just the most recent one is
JM a local decision

Want to DoS someone?  Have fun with bogus Received: headers in actual
junk mail.  Developing heuristics to try detecting this is interesting.
It's not impossible, but it's hardly an exact science.


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.



Re: AOL scomp

2005-02-24 Thread Mark Radabaugh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Joe Maimon wrote:
| I believe one has an extra duty to be as strict as possible about
| accepting email to be forwarded to external parties:
|
| Read: Setup for every usuable blocklist, including you own, which
| rejects email outright. And spamassassin setup to reject any
| reasonable low FP score threshold. And none of that  tag em all
| and let the user sort it out business.
|
| Its not legitimate to cover your eyes and forward probable garbage
|  to someone else. You want it on your system, thats your decision.
|  AOL blocklisting high percentage garbage senders, including those
|  merely forwarding, is perfectly valid in my book.
|
| To blocklist all servers in the path or just the most recent one is
|  a local decision
Now here I would disagree.   These are specific requests by
individuals to forward mail to from one of their own accounts to
another one of their own accounts.   I do not think AOL (or anyone)
should consider mail forwarded at the customers request as indicating
that our mail servers are sending spam.
As that is apparently not the case I have seriously considered as a
matter of policy refusing to install mail forwards to AOL customers.
Mark Radabaugh
Amplex
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCHjCqg0PQSWMG2wsRAnnfAJ9IE+GIuYnBrDKrE3OlpAvZIuuXbQCfSEAS
GSSlg8c0AHPh044rMDauHyI=
=OjDT
-END PGP SIGNATURE-


Re: AOL scomp

2005-02-24 Thread Matthew Crocker

Due to AOL scomp and SPF we have stopped forwarding all together.  
Existing accounts are grandfathered and we are working on migrating 
them all to IMAP-SSL.  ALL new accounts have to IMAP their mail from 
our servers.  I get  WAY too much junk from forwarded mail going to 
AOL.  I also get way too many tech support calls about forwarded mail 
being rejected because of SPF

-Matt


Re: AOL scomp

2005-02-24 Thread John Osmon

On Thu, Feb 24, 2005 at 07:08:07PM +, Edward B. Dreger wrote:
[...]

 On the cynical side:  Has anyone considered an inverted blacklist --
 i.e., a _destination_-based mail blocking mechanism?  Rejecting mail to
 parties with excessive bogus complaint rates certainly might simplify
 life for those tasked with handling abuse incidents. ;-)

It's interesting that you should ask that today.  A few days ago
we started throwing around an idea along these lines:
  - N = # of bogus abuse/spam reports for a given destination
  - X = # of reports where we stop delivering mail to 
a given destination
  - for 0  N  X -- deliver the mail, but also inform the sender
that the destination address has reported spam/abuse coming from
our network, and that if it continues, we won't deliver mail
to that destination anymore.
  - for N  X -- tell the sender that we aren't delivering the mail
because it is likely to get us put on a blacklist.  

We haven't fleshed things out completely, because we're not sure
the cure is better than the disease yet...
 
-- 
John Osmon


Re: Who is watching the watchers?

2005-02-24 Thread Fergie (Paul Ferguson)


I like how Good Morning Silicon Valley phrased it:

In other news, Ken Lay was appointed Director of the
Treasury 

http://www.siliconvalley.com/mld/siliconvalley/business/columnists/gmsv/10981910.htm

- ferg


-- Adam Jacob Muller [EMAIL PROTECTED] wrote:

This would be like having Ken Lay write our energy policy...
 wait, we already did that


Adam

On Feb 24, 2005, at 9:28 AM, Eric Brunner-Williams in Portland Maine 
wrote:


 Former chief privacy officer of Gator has been appointed to the Data
 Privacy and Integrity Advisory Committee of the Department of 
 Homeland
 Security.

 http://www.salon.com/politics/war_room/2005/02/23/gator/index.html

 as president bush (jr) said on tv in the days following 9/11,
 america is open for business!

 You don't want to know who is the CPO for DHS. Its FUBAR all the way 
 up.

 Eric





Re: Who is watching the watchers?

2005-02-24 Thread Jim Popovitch

On Thu, 2005-02-24 at 15:10 -0500, Adam Jacob Muller wrote:
 This would be like having Ken Lay write our energy policy...
  wait, we already did that
 

What?!? We have an energy policy?

(who is we?)

-Jim P.



Spoofing and Internet Filtering

2005-02-24 Thread Robert Beverly


Hi all,

I'm working on a project designed to determine the extent of ingress and
egress filtering on the Internet.  Specifically interested in the ability
to forge headers and source spoofed packets.  The project relies on
clients running an active measurement program from as wide a distribution
of netblocks as possible.  If you're curious about your connection,
your upstream or how prevalent filtering is on other's networks,
try out the source or one of the binaries from:
http://momo.lcs.mit.edu/spoofer/

Many more details of the program, methodology and current results are 
on the web site as well.  Thanks!

rob



Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Nils Ketelsen

On Tue, Feb 15, 2005 at 09:00:11PM -0500, Sean Donelan wrote:

 Although RFC2476 was published in December 1998, its amazing
 how few mail providers support the Message Submission protocol
 for e-mail on Port 587.  Even odder, some mail providers
 use other ports such as 26 or 2525, but not the RFC recommended
 Port 587 for remote authenticated mail access for users.

I can not say anything about other providers, but I don't do it for a
simple reason: I think it is completely pointless. 

 What can be done to encourage universities and other mail providers
 with large roaming user populations to support RFC2476/Port 587?

Give a good reason. That is still the missing part.


Nils


informal survey -- have you submitted a talk to nanog been refused?

2005-02-24 Thread Paul Vixie

i'm trying to understand the supposed dearth of submissions, but i've never
been on the programme committee and so i need some data.  if you've submitted
a paper to nanog that was refused -- ever! -- and are willing to share details
(ideally including the reasons you were given for the refusal, and what you
were asked to do to fix them, and what you actually did) please send me e-mail.


Re: AOL scomp

2005-02-24 Thread Matt Taber
Postini is my friend too.
But the more we can do to get rid of spam on our own, the less we have 
to pay Postini each month.

What we pay to Postini a year could pay a persons salary!
--
If you really want something in this life, you have to work for it. 
Now, quiet! They're about to announce the lottery numbers...
- Homer Simpson


Drew Weaver wrote:
Postini is my friend :-)
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
chuck goolsbee
Sent: Thursday, February 24, 2005 1:19 PM
To: [EMAIL PROTECTED]
Subject: Re: AOL scomp

It's too bad that about 1/3 of the reported mails are valid opt-in
lists.
The other 1/3rd are actual spam, but legitimately forwarded as the 
user requested from a personal or business domain to an AOL account. 
Any server in the path gets tagged as a spam source.

And the remaining third seems to be just plain old normal personal 
correspondence ... which I find weird.


Ahh well -- this is a nice mechanism that AOL provides, IMO.

Agreed, though maybe they should look at SpamAssasin or Postini. Take 
their end-users out of the filtering mechanism somehow.

--chuck




Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Florian Weimer

* Nils Ketelsen:

 What can be done to encourage universities and other mail providers
 with large roaming user populations to support RFC2476/Port 587?

 Give a good reason. That is still the missing part.

From the MTA perspective, 25/TCP is the you are responsible for the
message port, 587/TCP is the I will be responsible for the message
port.  In other words, the implied abuse management contracts differ
significantly.  

However, this is mostly theory.  I'm not sure if mail providers will
try to pass responsibility for spam injected on 587/TCP to the ISP
from whose address space the message was submitted.  (They already do
so for some parts of the abuse management process, e.g. law
enforcement requests.)


Forwarding spam (was Re: AOL scomp)

2005-02-24 Thread J.D. Falk

On 02/24/05, Edward B. Dreger [EMAIL PROTECTED] wrote: 

  I see the same thing.  At least 2/3rds are spam forwarded along as
  described above.  I have to give some credit to AOL WRT handling that
  type of situation -- they're much better than MSN/Hotmail who do not
  have a whitelist or feedback loop and simply stop accepting mail for
  12+ hours from any server that reaches a particular spam threshhold.
 
 We now refuse to forward mail that's almost certainly spam.  Users may
 POP it, but forwarding is out.

Very good idea, given the lack of any standard way for a receiving 
ISP to know that the mail was forwarded.

-- 
J.D. Falk  uncertainty is only a virtue
[EMAIL PROTECTED]when you don't know the answer yet


Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Nils Ketelsen

On Thu, Feb 24, 2005 at 04:20:33PM -0500, [EMAIL PROTECTED] wrote:

 On Thu, 24 Feb 2005 16:08:42 EST, Nils Ketelsen said:
  On Tue, Feb 15, 2005 at 09:00:11PM -0500, Sean Donelan wrote:
   What can be done to encourage universities and other mail providers
   with large roaming user populations to support RFC2476/Port 587?
  Give a good reason. That is still the missing part.

 If you're a roaming user from that provider, and you're at some other
 site that blocks or hijacks port 25, you can still send mail by tossing
 it to your main provider's 587.  If that's not a good enough reason to

And if I am a roaming user at some other site, that blocks or hijacks port
587?

 motivate the provider to support it, nothing will (except maybe when the
 users show up en masse with pitchforks and other implements of
 destruction...)

Then, I believe, nothing will motivate me.

Nils


Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Valdis . Kletnieks
On Thu, 24 Feb 2005 16:08:42 EST, Nils Ketelsen said:

 On Tue, Feb 15, 2005 at 09:00:11PM -0500, Sean Donelan wrote:

  What can be done to encourage universities and other mail providers
  with large roaming user populations to support RFC2476/Port 587?
 
 Give a good reason. That is still the missing part.

If you're a roaming user from that provider, and you're at some other
site that blocks or hijacks port 25, you can still send mail by tossing it
to your main provider's 587.   If that's not a good enough reason to motivate
the provider to support it, nothing will (except maybe when the users show up
en masse with pitchforks and other implements of destruction...)



pgpSLtn68COiD.pgp
Description: PGP signature


RE: Why do so few mail providers support Port 587?

2005-02-24 Thread andrew2

[EMAIL PROTECTED] wrote:
 On Thu, 24 Feb 2005 16:08:42 EST, Nils Ketelsen said:
 
 On Tue, Feb 15, 2005 at 09:00:11PM -0500, Sean Donelan wrote:
 
 What can be done to encourage universities and other mail providers
 with large roaming user populations to support RFC2476/Port 587?
 
 Give a good reason. That is still the missing part.
 
 If you're a roaming user from that provider, and you're at
 some other site that blocks or hijacks port 25, you can still send
 mail by tossing it to your main provider's 587.   If that's not a
 good enough reason to motivate the provider to support it, nothing
 will (except maybe when the users show up en masse with pitchforks
 and other implements of destruction...)

There seem to be many who feel there is no overwhelming reason to
support 587.  I can certainly see that point of view, but I guess my
question is what reasons do those of you with that viewpoint have *not*
to implement it?  I just don't see the harm in either configuring your
MTA to listen on an extra port, or just forward port 587 to 25 at the
network level.  Other than a few man-hours for implementation what are
the added costs/risks that make you so reluctant?  What am I missing?

Andrew



Re: UN Panel Aims to End Internet Tug of War by July

2005-02-24 Thread William Warren
If the UN wants control of the INET WE invented.  Let them build 
their own.

Fergie (Paul Ferguson) wrote:
My favorite quote(s) from this very brief article:
Right now, the most recognizable Internet governance
body is a California-based non-profit company, the
International Corporation for Assigned Names and Numbers
(ICANN).
But developing countries want an international body,
such as the U.N.'s International Telecommunication
Union (ITU), to have control over governance -- from
distributing Web site domains to fighting spam.
http://today.reuters.com/news/newsArticle.aspx?type=internetNewsstoryID=2005-02-21T171326Z_01_N21644703_RTRIDST_0_NET-TECH-UN-DC.XML
- ferg
--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or
 [EMAIL PROTECTED]
--
My Foundation verse:
Isa 54:17  No weapon that is formed against thee shall prosper; 
and every tongue that shall rise against thee in judgment thou 
shalt condemn. This is the heritage of the servants of the LORD, 
and their righteousness is of me, saith the LORD.

-- carpe ductum -- Grab the tape
CDTT (Certified Duct Tape Technician)
Linux user #322099
Machines:
206822
256638
276825
http://counter.li.org/


Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Joe Maimon

[EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:
 

On Thu, 24 Feb 2005 16:08:42 EST, Nils Ketelsen said:
   

On Tue, Feb 15, 2005 at 09:00:11PM -0500, Sean Donelan wrote:
 

What can be done to encourage universities and other mail providers
with large roaming user populations to support RFC2476/Port 587?
   

Give a good reason. That is still the missing part.
 

If you're a roaming user from that provider, and you're at
some other site that blocks or hijacks port 25, you can still send
mail by tossing it to your main provider's 587.   If that's not a
good enough reason to motivate the provider to support it, nothing
will (except maybe when the users show up en masse with pitchforks
and other implements of destruction...)
   

There seem to be many who feel there is no overwhelming reason to
support 587.  I can certainly see that point of view, but I guess my
question is what reasons do those of you with that viewpoint have *not*
to implement it?  I just don't see the harm in either configuring your
MTA to listen on an extra port, or just forward port 587 to 25 at the
network level.  Other than a few man-hours for implementation what are
the added costs/risks that make you so reluctant?  What am I missing?
Andrew
 

What man hours? Thats the default setup for most sendmails!


Re: AOL scomp

2005-02-24 Thread Vinny Abello
At 03:08 PM 2/24/2005, Matthew Crocker wrote:

Due to AOL scomp and SPF we have stopped forwarding all together.
Existing accounts are grandfathered and we are working on migrating them 
all to IMAP-SSL.  ALL new accounts have to IMAP their mail from our 
servers.  I get  WAY too much junk from forwarded mail going to AOL.  I 
also get way too many tech support calls about forwarded mail being 
rejected because of SPF

-Matt
Forwarded mail shouldn't be rejected as a result of SPF if your mail server 
is using SRS to rewrite the from addresses in the mail from part of the 
SMTP transaction of the forwarded emails... as long as your SPF record 
isn't messed up of course. :)

Vinny Abello
Network Engineer
Server Management
[EMAIL PROTECTED]
(973)300-9211 x 125
(973)940-6125 (Direct)
PGP Key Fingerprint: 3BC5 9A48 FC78 03D3 82E0  E935 5325 FBCB 0100 977A
Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com (888)TELLURIAN
Courage is resistance to fear, mastery of fear - not absence of fear -- 
Mark Twain



RE: Why do so few mail providers support Port 587?

2005-02-24 Thread Jim Popovitch

If supporting one port is y hours of time and headache, then two ports
is closer to y*2 than y (some might argue y-squared).  587 has some
validity for providers of roaming services, but who else?  Why not
implement 587 behavior (auth from the outside coming in, and accept all
where destin == this system) on 25 and leave the rest alone?

-Jim P. 

On Thu, 2005-02-24 at 16:51 -0500, [EMAIL PROTECTED] wrote:
 [EMAIL PROTECTED] wrote:
  On Thu, 24 Feb 2005 16:08:42 EST, Nils Ketelsen said:
  
  On Tue, Feb 15, 2005 at 09:00:11PM -0500, Sean Donelan wrote:
  
  What can be done to encourage universities and other mail providers
  with large roaming user populations to support RFC2476/Port 587?
  
  Give a good reason. That is still the missing part.
  
  If you're a roaming user from that provider, and you're at
  some other site that blocks or hijacks port 25, you can still send
  mail by tossing it to your main provider's 587.   If that's not a
  good enough reason to motivate the provider to support it, nothing
  will (except maybe when the users show up en masse with pitchforks
  and other implements of destruction...)
 
 There seem to be many who feel there is no overwhelming reason to
 support 587.  I can certainly see that point of view, but I guess my
 question is what reasons do those of you with that viewpoint have *not*
 to implement it?  I just don't see the harm in either configuring your
 MTA to listen on an extra port, or just forward port 587 to 25 at the
 network level.  Other than a few man-hours for implementation what are
 the added costs/risks that make you so reluctant?  What am I missing?
 
 Andrew
 



Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Nils Ketelsen

On Thu, Feb 24, 2005 at 04:51:50PM -0500, [EMAIL PROTECTED] wrote:

 There seem to be many who feel there is no overwhelming reason to
 support 587.  I can certainly see that point of view, but I guess my
 question is what reasons do those of you with that viewpoint have *not*
 to implement it?  I just don't see the harm in either configuring your

Oh thats easy: It creates costs (for implementing it
on the servers and clients) and produces no benefit.

 MTA to listen on an extra port, or just forward port 587 to 25 at the
 network level.  Other than a few man-hours for implementation what are
 the added costs/risks that make you so reluctant?  What am I missing?

You are missing the operational costs (has to be included in the regular
failover tests, has to be monitored, has to be fixed if something breaks
etc.)

Any system I introduce is increasing risks and costs. If there is
no benefit to justify these, I won't do it.

Nils


Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Paul Vixie

 On Tue, Feb 15, 2005 at 09:00:11PM -0500, Sean Donelan wrote:
 
  Although RFC2476 was published in December 1998, its amazing how few
  mail providers support the Message Submission protocol for e-mail on
  Port 587.  Even odder, some mail providers use other ports such as 26
  or 2525, but not the RFC recommended Port 587 for remote authenticated
  mail access for users.

well, in sbc-dsl-land, port 25 and port 587 are blocked, but port 26 gets
through.  it seems bizarre that port 587 would ever be blocked, but when
i encountered it, port 26 was my next choice.  perhaps other e-mail providers
had the same problem and used the same plan-b.

  What can be done to encourage universities and other mail providers
  with large roaming user populations to support RFC2476/Port 587?
 
 Give a good reason. That is still the missing part.

it's smtp that only works if you can authenticate.  thus it's only useful
for your own user population, and completely safe to leave open to the world
(as long as your user population keeps their passwords safe, that is.)
-- 
Paul Vixie


RE: Why do so few mail providers support Port 587?

2005-02-24 Thread Smoot Carl-Mitchell

On Thu, 2005-02-24 at 17:14 -0500, Jim Popovitch wrote:
 If supporting one port is y hours of time and headache, then two ports
 is closer to y*2 than y (some might argue y-squared).  587 has some
 validity for providers of roaming services, but who else?  Why not
 implement 587 behavior (auth from the outside coming in, and accept all
 where destin == this system) on 25 and leave the rest alone?

I did run into a case where supporting port 587 was useful. I found out
the hard way that one Internet service provider for hotels blocked
outbound port 25, but not 587. So sending outbound mail to my mail relay
would have been impossible without support for port 587.
-- 
Smoot Carl-Mitchell
System/Network Architect
email: [EMAIL PROTECTED]
cell: +1 602 421 9005
home: +1 480 922 7313


Finding useful/pertinent IP reallocation WHOIS info

2005-02-24 Thread Fergie (Paul Ferguson)


Can anyone provide a better way to find, say, the appropriate
contact information for address blocks that are further rellocated
from the regional registries? I've about reached my frustration
levels over the course of the past year on the issue.

Example: Trying to find the approriate contact info for an
abuse@ address responsible for a malicious host that (may)
reside within an address block in Brazil (not meaning to pick
on Brazil by no means). Checking the WHOIS database at:

http://lacnic.net/cgi-bin/lacnic/whois?lg=EN

...you can find that:

#These addresses have been further assigned to Brazilian users.
#Contact information can be found at the WHOIS server located
#at whois.registro.br and at http://whois.nic.br

No, it can't. At least not that I can ascertain.

And when arriving at either of these web pages, the only
lookup available to the user is a CGI form for domain-only
registry lookups, not for IP address allocation info.

I was also hoping that the Referral WHOIS (RWhois) database
might provide some assiatance, I am informed only that the
responsible registry is the Latin American and Caribbean IP
address Regional Registry.

I have tried many times to solicit a response via e-mail
from someone at the Brazilian registry to no avail.
 
Very frustrating.

The system is broken and needs to be fixed. Registries: Are you
listening?

- ferg

--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or
 [EMAIL PROTECTED]


Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Valdis . Kletnieks
On Thu, 24 Feb 2005 16:51:50 EST, [EMAIL PROTECTED] said:

 There seem to be many who feel there is no overwhelming reason to
 support 587.  I can certainly see that point of view, but I guess my
 question is what reasons do those of you with that viewpoint have *not*
 to implement it?  I just don't see the harm in either configuring your
 MTA to listen on an extra port, or just forward port 587 to 25 at the
 network level.  Other than a few man-hours for implementation what are
 the added costs/risks that make you so reluctant?  What am I missing?

You *don't* want to just forward 587 to 25.  You want to to use SMTP AUTH
or similar on 587 to make sure only *your* users connect to it as a mail
injection service (unless, of course, you *want* to be a spam relay ;)

The *real* problem is usually that the site is too clueless to figure out how
to enable AUTH on 587, actually authenticate the user (which might involve
something really complicated, like LDAP or RADIUS), and tell the script monkeys
at first-level support what to tell the users.



pgpLNA7xg8EjF.pgp
Description: PGP signature


Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Andrew - Supernews

 Paul == Paul Vixie [EMAIL PROTECTED] writes:

 Paul well, in sbc-dsl-land, port 25 and port 587 are blocked, but
 Paul port 26 gets through.

I have a port-587 relay on my network which is used by some
sbc-dsl-land users... they don't appear to be blocked

-- 
Andrew, Supernews
http://www.supernews.com



Re: Finding useful/pertinent IP reallocation WHOIS info

2005-02-24 Thread Fergie (Paul Ferguson)


Thanks to all who responded privately off-list.

What I was looking for: http://registro.br/cgi-bin/nicbr/whois

..which wasn't exactly intuitive from the main page:
http://registro.br/index.html

Also, I liked the alternative suggestion of:

  telnet rwhois.whatever.foo 4321
  enter dotted quad or other item of interest

..however, one thing that I didn't mention in my original
post is that what I was looking for was a _simple_ method
for our staff to use which didn't require a maze of thought
challenges (or a Captain Midnight Decoder Ring) -- something
they could just point a web broswer at and find correct
contact information for IP reallocation data. Unfortunately,
everyone in a particluar organization has access to a CLI
WHOIS client, or even a Windoze WHOIS client that provides
detailed information with a variety of options.

Is it the case that SPAM purveyors have put us in the
unfortunate position where there isn't readily available
access to SWIP/reallocation information? What a shame.

Thanks to one and all,

- ferg

-- Fergie (Paul Ferguson) [EMAIL PROTECTED] wrote:


Can anyone provide a better way to find, say, the appropriate
contact information for address blocks that are further rellocated
from the regional registries? I've about reached my frustration
levels over the course of the past year on the issue.

Example: Trying to find the approriate contact info for an
abuse@ address responsible for a malicious host that (may)
reside within an address block in Brazil (not meaning to pick
on Brazil by no means). Checking the WHOIS database at:

http://lacnic.net/cgi-bin/lacnic/whois?lg=EN

...you can find that:

#These addresses have been further assigned to Brazilian users.
#Contact information can be found at the WHOIS server located
#at whois.registro.br and at http://whois.nic.br

No, it can't. At least not that I can ascertain.

And when arriving at either of these web pages, the only
lookup available to the user is a CGI form for domain-only
registry lookups, not for IP address allocation info.

I was also hoping that the Referral WHOIS (RWhois) database
might provide some assiatance, I am informed only that the
responsible registry is the Latin American and Caribbean IP
address Regional Registry.

I have tried many times to solicit a response via e-mail
from someone at the Brazilian registry to no avail.
 
Very frustrating.

The system is broken and needs to be fixed. Registries: Are you
listening?

- ferg

--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or
 [EMAIL PROTECTED]



Re: AOL scomp

2005-02-24 Thread james edwards

- Original Message - 
From: Matt Taber [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, February 24, 2005 2:15 PM
Subject: Re: AOL scomp



 Postini is my friend too.

 But the more we can do to get rid of spam on our own, the less we have
 to pay Postini each month.


Postini's admin. interface is always slow (we have been a customer for 3
years) and as of 20 mins. ago quit working altogether.
Users cannot log into their message centers.

The new contract we just got, with increase, does not sit well at present.

James H. Edwards
Routing and Security Administrator
At the Santa Fe Office: Internet at Cyber Mesa
[EMAIL PROTECTED]  [EMAIL PROTECTED]
http://www.cybermesa.com/ContactCM
(505) 795-7101



Re: UN Panel Aims to End Internet Tug of War by July

2005-02-24 Thread Joel Jaeggli
yOn Thu, 24 Feb 2005, William Warren wrote:
If the UN wants control of the INET WE invented.  Let them build their own.
I think people get confused about who the stake holders in internet 
operation/governance really are... certainly ICANN allways was when I was 
actively observing it.

The stake holders with the most to lose are ordinary enduser consumers of 
interenet services. They just want to get their work / entertainment / 
communication done, and to the extent that technocrats, bureaucrats , 
crimnals , extremely greedy businesses , and rogue governments setup 
barriers that impede them from doing that they lose.

Fergie (Paul Ferguson) wrote:
My favorite quote(s) from this very brief article:
Right now, the most recognizable Internet governance
body is a California-based non-profit company, the
International Corporation for Assigned Names and Numbers
(ICANN).
But developing countries want an international body,
such as the U.N.'s International Telecommunication
Union (ITU), to have control over governance -- from
distributing Web site domains to fighting spam.
http://today.reuters.com/news/newsArticle.aspx?type=internetNewsstoryID=2005-02-21T171326Z_01_N21644703_RTRIDST_0_NET-TECH-UN-DC.XML
- ferg
--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or
 [EMAIL PROTECTED]

--
-- 
Joel Jaeggli  	   Unix Consulting 	   [EMAIL PROTECTED] 
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2



Re: AOL scomp

2005-02-24 Thread Matthew Crocker

Forwarded mail shouldn't be rejected as a result of SPF if your mail 
server is using SRS to rewrite the from addresses in the mail from 
part of the SMTP transaction of the forwarded emails... as long as 
your SPF record isn't messed up of course. :)

I know but that just wreaks of a hack which I'm not currently willing 
to do.  It works better for us to terminate the forwarding and sell the 
customer full mail service.  My SPF record isn't messed up as far as I 
know.

-Matt


Re: AOL scomp

2005-02-24 Thread Rich Kulawiec

On Thu, Feb 24, 2005 at 02:53:14PM -0500, Mark Radabaugh wrote:
 Now here I would disagree.   These are specific requests by
 individuals to forward mail to from one of their own accounts to
 another one of their own accounts.

But a request to forward mail is not a request to facilitate
abuse by forwarding spam.

 I do not think AOL (or anyone) should consider mail forwarded
 at the customers request as indicating that our mail servers are sending spam.

Why not?

Did it come from your servers?  On your network?

If yes, then it's YOUR spam, and you should expect to held fully
accountable for it.  If that's an unpleasant notion, and I'll stipulate
that it sure is for me, then you need to do whatever you need to do
in order to put a sock in it.

We are long past the time when excuses for relaying/forwarding/bouncing
spam were acceptable. The techniques for mitigating these -- at least
to cut down a torrent to a trickle -- are well-known, well-understood,
well-documented and readily available in a variety of implementations.


More generally, the best place to stop spam is as near its source as
possible.  So if you're the forwarder, you're at least one hop closer to
the source than the place you're forwarding to -- thus you should have
a better chance than they do of stopping it.  And you should at least
make a credible try: nobody expects perfection (though we certainly hope
for it) but doing _nothing_ isn't acceptable, either.


So, for instance: take advantage of the AOL feedback loop.  Anything
that they're catching -- that you're not -- indicates an area where
you can improve what you're doing.  Find it, figure it out, and do it.
Everyone benefits -- including all your users who aren't having their
mail forwarded.

---Rsk


Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Valdis . Kletnieks
On Thu, 24 Feb 2005 17:14:17 EST, Jim Popovitch said:
 
 If supporting one port is y hours of time and headache, then two ports
 is closer to y*2 than y (some might argue y-squared).  587 has some
 validity for providers of roaming services, but who else?  Why not
 implement 587 behavior (auth from the outside coming in, and accept all
 where destin == this system) on 25 and leave the rest alone?

Well, OK.  If you know for a *fact* that your users *never* roam, and you
have sufficiently good control of your IP addresses that you can always safely
decide if a given connection is inside or outside and allow them to relay
based on that, then no, you don't need to support 587.

The rest of us run mail services in the real world, where lots of users buy
laptops, and then actually gasp, shock *use* the portability and thus often
end up behind some other ISP's port-25 block.


pgpoyKPFNoFtR.pgp
Description: PGP signature


Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Jim Popovitch

On Thu, 2005-02-24 at 23:36 -0500, [EMAIL PROTECTED] wrote:

 The rest of us run mail services in the real world, where lots of users buy
 laptops, and then actually gasp, shock *use* the portability and thus often
 end up behind some other ISP's port-25 block.

Why not a VPN solution.  If you have mail servers that your users need,
chances are that you also have file servers, internal web servers.
calender servers, etc.  Should file/web/calender servers all open one
port or internal access and a second port for authenticated external
access?

-Jim P.






Re: AOL scomp

2005-02-24 Thread Robert Bonomi

 From [EMAIL PROTECTED]  Thu Feb 24 23:19:15 2005
 Date: Thu, 24 Feb 2005 22:46:13 -0500
 From: Rich Kulawiec [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: AOL scomp


 On Thu, Feb 24, 2005 at 02:53:14PM -0500, Mark Radabaugh wrote:
  Now here I would disagree.   These are specific requests by
  individuals to forward mail to from one of their own accounts to
  another one of their own accounts.

 But a request to forward mail is not a request to facilitate
 abuse by forwarding spam.

  I do not think AOL (or anyone) should consider mail forwarded
  at the customers request as indicating that our mail servers are sending 
  spam.

 Why not?

Because the recipient *expressly* requested that all mail which would reach
my inbox on your system be sent to me at AOL (or any other somewhere else).

This means that every such message from the 'forwarding' system to the
destination system is, BY DEFINITON, solicited.  The mailbox owner has
expressly and explicictly requested those messages be sent to him at the
receiving system.

If that person then reports such messages -- that they have EXPRESSLY requested
be sent to the receiving system -- as spam, to the operator of the receiving
system, then that person is *indisputably* IN THE WRONG for doing so.

The _person_ who issued the directive causing that message to end up in the
recipient's inbox is the *recipient*himself*.  If he reports the message as
spam, then it can be logically held that *he* is the spammer.  And his 
access on *both* systems (forwarding and receiving) should be terminated 
for AUP violation.

Now, if the recipient wants to report it to the forwarding system -- so
that they can block any further inbound attempts -- that's a whole nother
story.

Of course, this requires that the person involved be smart enough to 
read and understand the headers on the message.

In actuality, *I* am not QUITE as draconian as suggested a couple of 
paragraphs previously.  If I forward somebody's mail and get a complaint
from the reciveing system about spam to that user, originating from my 
system, that user *permanently* loses any forwarding privileges/capabilities.
No appeal, no _notice_ no 'second chance', no nothing -- forwarding just 
stops working for them. They _were_ told of this down-side risk, with 
regard to such an error, *before* the forwarding was enabled. They get to 
live with the consequences.





Re: Why do so few mail providers support Port 587?

2005-02-24 Thread Adrian Chadd

On Fri, Feb 25, 2005, Jim Popovitch wrote:
 
 On Thu, 2005-02-24 at 23:36 -0500, [EMAIL PROTECTED] wrote:
 
  The rest of us run mail services in the real world, where lots of users buy
  laptops, and then actually gasp, shock *use* the portability and thus 
  often
  end up behind some other ISP's port-25 block.
 
 Why not a VPN solution.  If you have mail servers that your users need,
 chances are that you also have file servers, internal web servers.
 calender servers, etc.  Should file/web/calender servers all open one
 port or internal access and a second port for authenticated external
 access?

It'd be nice. :)

Although, its different for ISP access. An office, sure, a VPN is possibly
the right solution. But your ISP email account? Why VPN to your ISP just for
that?




Adrian

-- 
Adrian ChaddYou don't have a TV? Then what's
[EMAIL PROTECTED] all your furniture pointing at?