Re: Barracuda Networks Spam Firewall

2004-07-28 Thread Joe Hamelin

Here's what I got today from Barracuda.  I'll let you know if it did
indeed fix my problems.


Hi Joe,

Your latency problem should be resolved.


===
On July 27th a new stream of spam was introduced into the wild. This
spam contained certain formatting
aspects that were intentionally designed to cause Spam Assassin's
Bayesian implementation to run at
extremely slow speeds. Due to the way Spam Assassin handled the email,
it was taking several minutes to
process these messages and the Barracuda's internal processes would
detect the potential problem and start
queuing mail to prevent any mail loss. Unfortunately this precaution
had the byproduct of further
increasing the message latency on the system.

 
Barracuda Networks' team of engineers created a patch for this Spam
Assassin attack. The patch was
released in version 1.6.733 of the spam definitions. If you were
affected by the new spam, please make
sure you are running this version or higher of the spam definitions
(Advanced-Energize Updates in the web
GUI). Also, if you had previously contacted tech support and were
advised to disable Intention Analysis
(Basic-Bayesian/Fingerprinting) as a way to attempt to reduce
latency, you should be able to turn this
feature back on without any issues.

===

Let me know if you have any additional concerns.

Heather

Heather Russell
Barracuda Networks
408.342.5447 Direct
408.342.1061 Fax
[EMAIL PROTECTED]
www.barracudanetworks.com


-- 
Joe Hamelin 
Edmonds, WA, US


Re: Barracuda Networks Spam Firewall

2004-07-27 Thread Joe Hamelin

Is anyone else on NANOG having problems with Barracuda today?  I'm
getting massive latency (3000+ seconds) and it seems as if their tech
support has gone into meltdown.  While on hold I was even connected to
another customer with the same problem.

-- 
Joe Hamelin 
Edmonds, WA, US


Re: Barracuda Networks Spam Firewall

2004-07-27 Thread Joe Hamelin

I just talked to Heather (sales) at Barracuda and was told that there
would be a FIRMWARE release in the morning to fix a problem with virus
detection.

It seems that the support ppl can't really do anything right now and
their phone system is melting.  The word is to hold tight for a fix.

-- 
Joe Hamelin 
Edmonds, WA, US


Re: Barracuda Networks Spam Firewall

2004-07-27 Thread Matthew Crocker

My Series 400 seems to be doing fine today.  Average queue latency 4 
seconds which is about normal.

Do you have any special config settings?
-Matt
On Jul 27, 2004, at 7:21 PM, Joe Hamelin wrote:
I just talked to Heather (sales) at Barracuda and was told that there
would be a FIRMWARE release in the morning to fix a problem with virus
detection.
It seems that the support ppl can't really do anything right now and
their phone system is melting.  The word is to hold tight for a fix.
--
Joe Hamelin
Edmonds, WA, US



Re: Barracuda Networks Spam Firewall

2004-07-27 Thread Joe Hamelin

It only seems to be a problem when I hit above about 16k messages an
hour.  I do wish they had better numerical historical logging.  Maybe
in V3.0.


On Tue, 27 Jul 2004 20:03:08 -0400, Matthew Crocker [EMAIL PROTECTED] wrote:
 
 My Series 400 seems to be doing fine today.  Average queue latency 4
 seconds which is about normal.
 
 Do you have any special config settings?
 
 -Matt
 
 
 
 On Jul 27, 2004, at 7:21 PM, Joe Hamelin wrote:
 
 
  I just talked to Heather (sales) at Barracuda and was told that there
  would be a FIRMWARE release in the morning to fix a problem with virus
  detection.
 
  It seems that the support ppl can't really do anything right now and
  their phone system is melting.  The word is to hold tight for a fix.
 
  --
  Joe Hamelin
  Edmonds, WA, US
 
 
 


-- 
Joe Hamelin 
Edmonds, WA, US


Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Peter Galbavy
Eric A. Hall wrote:
What's most interesting about the half-dozen accusations of xenophobia
I've received (off-list and on) is that they've almost all come from
foreigners. I promise not to read anything into that. Really.
Could it be perhaps because us foreigners are conditioned by repeated 
exposure to the xenephobic attitudes of USofA patriots ?

Peter


Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Susan Harris

Folks, let's stop this thread. We're getting into 'spam is really bad'
comments, which aren't particularly enlightening to the list.


Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Randy Bush

 What's most interesting about the half-dozen accusations of xenophobia
 I've received (off-list and on) is that they've almost all come from
 foreigners. I promise not to read anything into that. Really.
 Could it be perhaps because us foreigners are conditioned by repeated 
 exposure to the xenephobic attitudes of USofA patriots ?

shut up or we'll bomb and torture you



Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Eric A. Hall



On 5/20/2004 8:25 AM, Randy Bush wrote:

What's most interesting about the half-dozen accusations of xenophobia
I've received (off-list and on) is that they've almost all come from
foreigners. I promise not to read anything into that. Really.

Could it be perhaps because us foreigners are conditioned by repeated 
exposure to the xenephobic attitudes of USofA patriots ?
 
 shut up or we'll bomb and torture you

resist the cycle of violence and hate

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Valdis . Kletnieks
On Wed, 19 May 2004 22:54:55 EDT, joe [EMAIL PROTECTED]  said:

 either
 1: SMTP/ESMTP is fixed so that spoofing cannot occur
 or
 2: Another method/protocol of email/messaging is adopted

3: We change the economics of spamming in some other fashion.  I've been
advocating taking up a collection - every ISP that has an inbound spam problem
kicks in just $100 - if there's 4,000 ISP's in the US (including all those
mompop sites with E-bay routers), that's a pretty chunk of change.  We then
hire a few representatives from choose ethnic organized crime to explain our
point of view to a few of the aforementioned 200 big offenders...

Unfortunately, there's these concepts of legality and morality involved... :)


pgpdjV5bJPBtY.pgp
Description: PGP signature


Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Rik van Riel

On Wed, 19 May 2004, Eric A. Hall wrote:

 my last 10 survivors are at http://www.ehsco.com/misc/last-10-spams.eml
 the relevant data for them in order of occurrance is below.

 eight are CN, one is KR, one is Geocities, and one is dead

Different people get different spam, from different sources.

For years I was under the impression that spammers must be
blasting everybody, so everybody would get similar spam.

I was surprised to find out that this isn't the case...

Rik
-- 
Debugging is twice as hard as writing the code in the first place.
Therefore, if you write the code as cleverly as possible, you are,
by definition, not smart enough to debug it. - Brian W. Kernighan


Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Eric A. Hall


On 5/20/2004 2:30 PM, Rik van Riel wrote:

 Different people get different spam, from different sources.

Yah, I've been advocating the use of a CIDR match-list from the beginning
for this and other reasons. Actually what you'd want is per-entry
weighting, so for me and my mailbox:

  CIDR 221.232.0.0/14 score = 3.0
  CIDR 147.28.0.0/16 score = -3.0

The ASN matching has merit too, so maybe:

  ASN 4134 score = 3.0
  CIDR holes punched = -3.0

etcetera

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Per Gregers Bilse

On May 20,  3:30pm, Rik van Riel [EMAIL PROTECTED] wrote:
 Different people get different spam, from different sources.
 
 For years I was under the impression that spammers must be
 blasting everybody, so everybody would get similar spam.
 
 I was surprised to find out that this isn't the case...

This is very true.  We're four people in the same company, and
there is the odd overlapping spam, but generally not at all;
not even over several days.  There must be some undiscovered
science in there.

  -- Per



Re: Barracuda Networks Spam Firewall

2004-05-20 Thread Paul Vixie

  Different people get different spam, from different sources.  ...
 
 This is very true.  We're four people in the same company, and
 there is the odd overlapping spam, but generally not at all;
 not even over several days.  There must be some undiscovered
 science in there.

according to http://www.dcc-servers.net/dcc/graphs/, most people get
most of the same spam, even if this doesn't appear in local measurements.

(note that these graphs are subtle and complex and wonderful, and deserve
several minutes of careful study before you try to draw any conclusions.)
-- 
Paul Vixie


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread James Couzens
On Tue, 2004-05-18 at 21:49, Eric A. Hall wrote:

 There's one rule that will wipe out ~90% of spam, but nobody seems to have
 written it yet.
 
   if URL IP addr is in China then score=100

I beg to differ Eric A. Hall.  

According to statistics gathered by the Spamhaus Project
(http://www.spamhaus.com) who most certainly have garnered my respect
through their very satisfying services, (SBL, XBL, ROKSO) it is the
Yankee's who are out of responsible for the majority of the internet's
Spam.  Lets have a look:

Top 10 Spam Countries April 2004:
-

1  United States
2  China
3  South Korea
4  Brazil
5  Taiwan
6  Argentina
7  Canada
8  Russia
9  Hong Kong
10 Italy

Top 10 Worst Spam ISPs April 2004:
--

1  mci.com (United States)
2  savvis.net (United States)
3  kornet.net (Korea)
4  above.net (United States)
5  chinanet-gd (China)
6  chinanet-cq (China)
7  xo.com (United States)
8  interbusiness.it (Italy)
9  level3.net (United States)
10 pccw.com (China)

Top 10 ROKSO Spammers April 2004:
-

1  Alan Ralsky (United States)
2  Scott Richter - Wholesalebandwidth (United States)
3  Alexey Panov - ckync.com (Germany)
4  John Grandinetti / 321send.com (United States)
5  Anthony ''Tony'' M. Banks (United States)
6  Eric Reinertsen (United States)
7  lmihosting.com (United States)
8  Webfinity/Dynamic Pipe (Canada)
9  Scott Richter - OptInRealBig (United States)
10 Eddy Marin - Oneroute (United States)

According to Spamhaus, 200 known Spam Operations are responsible for 90%
of your spam.  Of the list currently available on their site, 142 of the
known spammers are from a little country called THE UNITED STATES.

So contrary to what you said, perhaps I should just Null Route all email
originating from the USA?  ;)

If you reall wish to stop spam, first we need to stop forgery.  Then all
the spammers will have to resort to more legitimate means for sending
emails, but that being the case RHBL's become useful since because a
spammer would no longer be forging, using domain based black lists will
actually be useful.

How to stop spam:

#1 - Stop buying crap sold via spam!!!
#2 - Stop SMTP forgery
#3 - Raise the IQ of the average windows user/admin so they will be
physically cable of patching their OS who contrary to popular belief
isn't necessarily as crappy as everyone might think.

Implementing those above three steps is a healthy start.

Cheers,

James

-- 
James Couzens,
Programmer
-
http://libspf.org -- ANSI C Sender Policy Framework library
http://libsrs.org -- ANSI C Sender Rewriting Scheme library
-
PGP: http://gpg.mit.edu:11371/pks/lookup?op=getsearch=0x6E0396B3


signature.asc
Description: This is a digitally signed message part


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Steven Champeon

on Wed, May 19, 2004 at 03:12:29PM -0700, James Couzens wrote:
 On Tue, 2004-05-18 at 21:49, Eric A. Hall wrote:
 
  There's one rule that will wipe out ~90% of spam, but nobody seems to have
  written it yet.
  
if URL IP addr is in China then score=100
 ^^^
 
 I beg to differ Eric A. Hall.  

snip

 According to Spamhaus, 200 known Spam Operations are responsible for 90%
 of your spam.  Of the list currently available on their site, 142 of the
 known spammers are from a little country called THE UNITED STATES.

That may be, and is probably quite true - but as Eric said, a majority
of the /sites/ advertised in spam use China-based ISPs.

-- 
hesketh.com/inc. v: +1(919)834-2552 f: +1(919)834-2554 w: http://hesketh.com
Buy Cascading Style Sheets: Separating Content from Presentation, 2/e today!
http://www.amazon.com/exec/obidos/ASIN/159059231X/heskecominc-20/ref=nosim/


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Dan Hollis

On Wed, 19 May 2004, James Couzens wrote:
 On Tue, 2004-05-18 at 21:49, Eric A. Hall wrote:
  There's one rule that will wipe out ~90% of spam, but nobody seems to have
  written it yet.
if URL IP addr is in China then score=100
 I beg to differ Eric A. Hall.  

No Eric is quite correct. Read what he wrote again. Carefully.

-Dan



Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Eric A. Hall


On 5/19/2004 5:12 PM, James Couzens ([EMAIL PROTECTED]) wrote:

 On Tue, 2004-05-18 at 21:49, Eric A. Hall wrote:
 
 There's one rule that will wipe out ~90% of spam, but nobody seems to
 have written it yet.
 
 if URL IP addr is in China then score=100
  ^^^

not connection address, not domain 'owner', but URL-Hostname-IP_ADDR

What's most interesting about the half-dozen accusations of xenophobia
I've received (off-list and on) is that they've almost all come from
foreigners. I promise not to read anything into that. Really.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Richard Cox

On 19 May 2004 15:12:29 -0700 James Couzens [EMAIL PROTECTED] wrote:

| if URL IP addr is in China then score=100
| I beg to differ Eric A. Hall.
...
| 
| So contrary to what you said, perhaps I should just Null Route all
| email originating from the USA?  ;)

While this is verging off our remit here, I would clarify the point
originally made, which is that if a URL - that is, a URL cited in the
body of a message - points to an IP physically located in China, then
that signals a high probability of the message being spam.

The physical source of the message - which is likely to be in the US
or China - will most probably not be visible to the recipient due to
the use of anonymising proxies and other zombie senders - those IPs
are likely to be on consumer networks just about anywhere ...

-- 
Richard Cox



Re: Barracuda Networks Spam Firewall

2004-05-19 Thread James Couzens
On Wed, 2004-05-19 at 15:28, Eric A. Hall wrote:

 not connection address, not domain 'owner', but URL-Hostname-IP_ADDR
 
 What's most interesting about the half-dozen accusations of xenophobia
 I've received (off-list and on) is that they've almost all come from
 foreigners. I promise not to read anything into that. Really.

Fair enough, my apologies on my misinterpretation.  However, I am
curious what source you have for your statistic.  Going through the spam
that I've got access to (and it is a substantial amount allbeit not in
the millions of spam per day) I can't seem to associate the spam with
chinese urls, and certainly not to the extent that you indicate (90%).

Cheers,

James

-- 
James Couzens,
Programmer
-
http://libspf.org -- ANSI C Sender Policy Framework library
http://libsrs.org -- ANSI C Sender Rewriting Scheme library
-
PGP: http://gpg.mit.edu:11371/pks/lookup?op=getsearch=0x6E0396B3


signature.asc
Description: This is a digitally signed message part


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Eric A. Hall


On 5/19/2004 6:19 PM, James Couzens wrote:

 On Wed, 2004-05-19 at 15:28, Eric A. Hall wrote:

 Going through the spam that I've got access to (and it is a substantial
 amount allbeit not in the millions of spam per day) I can't seem to
 associate the spam with chinese urls, and certainly not to the extent
 that you indicate (90%).

extract hostname from url, dig on hostname, whois on addr, and nine times
out of ten the host is in a CN netblock. that's from the spam that gets
into my mailbox.

let me state AGAIN that what I really want is a plugin that allows for
cidr match-lists so that I can also include the handful of non-enforcing
hosters in Russia, New York, Florida, etc. One responder also suggested
ASN matchlists but I'm not that mad.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Stephen J. Wilcox

On Wed, 19 May 2004, Richard Cox wrote:

 While this is verging off our remit here, I would clarify the point
 originally made, which is that if a URL - that is, a URL cited in the
 body of a message - points to an IP physically located in China, then
 that signals a high probability of the message being spam.

Altho this is probably not true if you're one of the billion or so people who 
live in or around China or are of Chinese origin.. 

Steve



Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Dan Hollis

On Thu, 20 May 2004, Stephen J. Wilcox wrote:
 On Wed, 19 May 2004, Richard Cox wrote:
  While this is verging off our remit here, I would clarify the point
  originally made, which is that if a URL - that is, a URL cited in the
  body of a message - points to an IP physically located in China, then
  that signals a high probability of the message being spam.
 Altho this is probably not true if you're one of the billion or so people who 
 live in or around China or are of Chinese origin.. 

Actually mainland chinese non-spammers seem to prefer offshore hosting eg 
hk, taiwan, japan or north america.

I guess all the mainland chinese webhosting is all taken up by spam 
operators or something.

-Dan



Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Randy Bush

perhaps this all belongs on alt.jingo.weenies?  can we focus on
network operations not network exclusionism?  this is worse than
spam.



Re: Barracuda Networks Spam Firewall

2004-05-19 Thread James Couzens
On Wed, 2004-05-19 at 16:24, Eric A. Hall wrote:
 extract hostname from url, dig on hostname, whois on addr, and nine times
 out of ten the host is in a CN netblock. that's from the spam that gets
 into my mailbox.

Yes I understand that is what you meant.  I just did this on 5 spam in
my mail box, I got:

Domain Name: AAFMALE.BIZ (www.aafmale.biz)
Registrant Country: Canada
Resolves to address: 218.232.109.220 (KRNIC-K) (Korea)

Domain Name: PLANENEWS.COM
Registrant Country: France
Resolves to address: 216.92.194.65 (PAIRNET-BLK-3) (United States)

Domain Name: MIRGOS.ORG
Registrant Country: Russia
Resolves to address: 211.198.200.208 (KRNIC-KR) (Korea)

Domain Name: WINSPR.BIZ  (iityvzbtpvw.winspr.biz)
Registrant Country: New Zealand
Resolves to address: 221.233.29.33 (CHINANET-HB-JZ7) (China)

While it is only 5 mails, and certainly nothing to judge by, it does not
seem to be 90%.  Although Korea under APNIC it is not China.

 let me state AGAIN that what I really want is a plugin that allows for
 cidr match-lists so that I can also include the handful of non-enforcing
 hosters in Russia, New York, Florida, etc. One responder also suggested
 ASN matchlists but I'm not that mad.

What sort of plugin?  MTA? MUA?

Going back to my previous e-mail, all of this effort I think is being
placed in the wrong direction.  Focus should be placed on preventing
forgery, and educating users.  If we spent the money we are dropping on
hardware and software to stop spam (its in the BILLIONS) on educating
users and pushing anti-forgery / sender authentication/verification
methods forward, we'd have an easier time of all this.

Cheers,

James

-- 
James Couzens,
Programmer
-
http://libspf.org -- ANSI C Sender Policy Framework library
http://libsrs.org -- ANSI C Sender Rewriting Scheme library
-
PGP: http://gpg.mit.edu:11371/pks/lookup?op=getsearch=0x6E0396B3


signature.asc
Description: This is a digitally signed message part


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Eric A. Hall


On 5/19/2004 6:38 PM, Stephen J. Wilcox wrote:

 Altho this is probably not true if you're one of the billion or so
 people who live in or around China or are of Chinese origin..

just check for charset=US-ASCII first. come to think of it, ASCII would
probably give half the necessary weight alone.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Bruce Pinsky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
James Couzens wrote:
| On Wed, 2004-05-19 at 16:24, Eric A. Hall wrote:
|
|extract hostname from url, dig on hostname, whois on addr, and nine times
|out of ten the host is in a CN netblock. that's from the spam that gets
|into my mailbox.
|
|
| Yes I understand that is what you meant.  I just did this on 5 spam in
| my mail box, I got:
|
| Domain Name: AAFMALE.BIZ (www.aafmale.biz)
| Registrant Country: Canada
| Resolves to address: 218.232.109.220 (KRNIC-K) (Korea)
|
| Domain Name: PLANENEWS.COM
| Registrant Country: France
| Resolves to address: 216.92.194.65 (PAIRNET-BLK-3) (United States)
|
| Domain Name: MIRGOS.ORG
| Registrant Country: Russia
| Resolves to address: 211.198.200.208 (KRNIC-KR) (Korea)
|
| Domain Name: WINSPR.BIZ  (iityvzbtpvw.winspr.biz)
| Registrant Country: New Zealand
| Resolves to address: 221.233.29.33 (CHINANET-HB-JZ7) (China)
|
| While it is only 5 mails, and certainly nothing to judge by, it does not
| seem to be 90%.  Although Korea under APNIC it is not China.
|
|
Similar results.  Got 2 in the US, one in Brazil, one in Korea, and one in
China.
- --
=
bep
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (MingW32)
iD8DBQFAq/f4E1XcgMgrtyYRAhyJAKCrFKCYtQXJKaaqS52mQprWhIrb7gCgxvNY
0iH1BTcznV3Q1d2bFhI+mHo=
=nIXz
-END PGP SIGNATURE-


RE: Barracuda Networks Spam Firewall

2004-05-19 Thread Brian Battle
Title: RE: Barracuda Networks Spam Firewall





Eric,


 There's one rule that will wipe out ~90% of spam, but nobody seems to have
 written it yet.

 if URL IP addr is in China then score=100

 support for a generic lookup list of cidr blocks would get another 9%



I agree that geographically classifying the URL's embedded in the spams would be pretty slick, using the china.blackholes.us and cn-kr.blackholes.us RBLs has been pretty effective at reducing our spamload, as a supplement to the standard lookup services.

They do not descriminate between legit mails and spam mails from china. Everything from those IP blocks gets classified as spam. Luckily we don't ever get any client emails from those countries at this point and can use these filters without worrying about false-positives. (I think the doubleclick.blackholes.us is pretty funny too)

There are others at:
http://www.blackholes.us/


Is anyone else out there using these blackholes? I wonder how often they get updated.


Brian Battle
Confluence





Re: Barracuda Networks Spam Firewall

2004-05-19 Thread Eric A. Hall


On 5/19/2004 7:06 PM, James Couzens wrote:

 I just did this on 5 spam in my mail box, I got:

[domains ommitted--tripped my filters]

my last 10 survivors are at http://www.ehsco.com/misc/last-10-spams.eml
the relevant data for them in order of occurrance is below.

eight are CN, one is KR, one is Geocities, and one is dead


219.129.20.244
 inetnum:  219.128.0.0 - 219.137.255.255
 netname:  CHINANET-GD
 descr:CHINANET Guangdong province network

[timeout]

221.233.29.78
 inetnum:  221.233.0.0 - 221.233.47.255
 netname:  CHINANET-HB-JZ7
 descr:The Chinanet network in Jinzhou ,Hubei province

202.104.242.133
 inetnum:  202.104.0.0 - 202.104.255.255
 netname:  CHINANET-GD
 descr:CHINANET Guangdong province network

221.233.29.33
 inetnum:  221.233.0.0 - 221.233.47.255
 netname:  CHINANET-HB-JZ7
 descr:The Chinanet network in Jinzhou ,Hubei province

[dupe host for CN]

219.148.126.47
 inetnum:  219.148.0.0 - 219.148.159.255
 netname:  CHINATELECOM-he
 descr:CHINANET hebei province network

66.218.77.68 (geocities, heh)
 OrgName:Yahoo!
 City:   Sunnyvale
 StateProv:  CA

[dupe host for CN]

[dupe host for CN]

218.152.186.107
 inetnum:  218.144.0.0 - 218.159.255.255
 netname:  KORNET
 descr:KOREA TELECOM


-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread James Couzens
On Wed, 2004-05-19 at 17:47, Randy Bush wrote:

 gosh!  maybe someone should set up a mailing list to discuss
 spam, anti-spam, ...?
 
 you mean they have?  well, then maybe a bunch of us network 
 operators (as opposed to spam weenies) should go over there
 and talk about sdh, router configs, circuit provisioning,
 etc.
 
 get a clue, spam weenies!

I've got a clue Randy Bush.  Last time I checked SPAM has a serious
impact on my network, and the network of others.  The topic of SPAM is
exceptionally relative to someone who operates a network.  Now enough of
the needless insults and forward with the discussion at hand.

Cheers,

James

-- 
James Couzens,
Programmer
-
http://libspf.org -- ANSI C Sender Policy Framework library
http://libsrs.org -- ANSI C Sender Rewriting Scheme library
-
PGP: http://gpg.mit.edu:11371/pks/lookup?op=getsearch=0x6E0396B3


signature.asc
Description: This is a digitally signed message part


Re: Barracuda Networks Spam Firewall

2004-05-19 Thread joe

Folks, If I may offer a humble opinion here before this gets out of hand.

I see many (me included) trying to side step the issue that SMTP is a broken
and insecure protocol for that of electronic messages(ing). I see folks
blacklisting,
RBLing, and other methods in an attempt to fix the issue, which frankly is a
band-aid
to the entire mess. We can sit here and do route statements like
ip route 200.0.0.0 255.0.0.0 127.0.0.1 till were blue in the face and need a
spread sheet
to keep up with the muk, but its only a side step to the problem. Until
either
1: SMTP/ESMTP is fixed so that spoofing cannot occur
or
2: Another method/protocol of email/messaging is adopted
we are only going to keep spinning our wheels so to speak.

I hate just as much as the rest to pay for the garbage of spam, but until
all the MS and AOL
users start using another standard we'll have to keep bandaiding the problem
to
keep our customers and jobs. We can all agree its a problem, period.

But as always, just my 2¢s

Joe Blanchard


- Original Message -
From: James Couzens [EMAIL PROTECTED]
To: Randy Bush [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Wednesday, May 19, 2004 8:59 PM
Subject: Re: Barracuda Networks Spam Firewall




Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Martin Hepworth
Matthew
Spamassassin needs quite a bit of tweaking above the out of the box 
setup. I run about 7000 messages a day here, 70% spam, .5% virus (clamav 
and Sophos), very very rarely a FP. I get bove 99% hit rate after adding 
in bayes, serveral additional rules from www.rulesemporium.org and the 
URI checkes. Runs on a 600mhz celeron with load avg  .5

--
Martin Hepworth
Snr Systems Administrator
Solid State Logic
Tel: +44 (0)1865 842300
Matthew Crocker wrote:

On May 17, 2004, at 2:35 PM, Claydon, Tom wrote:
Doing evaluations on anti-spam, anti-virus solutions, and ran across
this:
http://www.barracudanetworks.com/
Looks like a good box -- even won an Editor's Choice award from Network
Computing recently.
Does anyone on list have any experience with these boxes? If so, how are
they with false positives, quarantine capabilities, etc?
Tom,
 I have a Barracuda Spam Firewall 400,  We handle about 9k users and the 
thing is AMAZING!

My old setup was 4 dual-PIII 550Mhz, 1 GIg RAM running 
Qmail/Qmail-ldap/spamassasin/F-Secure AV.   My inbox would get 300+ 
spams/day, many of them not tagged at all
This setup would melt  on a regular basis when spam floods would come in

My current setup is a Barracuda 400 and 1 inbound mail server (dual 
P-III 550Mhz...).  My inbox now gets 5 untagged spams/day and about 10 
quarantined.
This setup has been able to handle everything thrown at it so far with 
no  noticeable performance hit

My customers love it,  I love it,  best  thing I have purchased in the 
last 12 months.  Very low false positives and high hit rate.  The 
quarantine box is very easy to handle for users,  they will get an 
e-mail once per day with a list of messages and links to whitelist, 
deliver or delete.  When they click on a  link they will connect/log 
into the Barracuda.  They can manage their own Bayesian filters from the 
quarantine interface.

It really has had a dramatic effect on my spam,  I'm wondering what I'll 
be doing with all my spare time now that I don't have to manage my mail 
server.

I was watching the message log one day and noticed a spam flood in action.
10 messages came in and went to customers tagged about 0.5 or so
10 messages came in and went to customers tagged as ::SPAM:: with a 
score of 3.7 or so
10 messages came in and went to quarantine with a score of 5.5 or so
a bazillion messages were blocked with a score  20

It learned very fast.
My Barracuda is currently blocking 500k+ messages/day
current stats  (installed 13 days)
Blocked (SPAM) :7453215
Blocked (Virus)  : 24600
Quarantined   : 82170
Tagged: 31552
Allowed   : 580876
Average Queue latency :  4 seconds
Unique Recipients : 8245
I just signed up as a reseller and I'm building a managed mail solution 
around it.

If you are an ISP I recommend you get a 400 series or higher.  You can 
customize the web interface a bit and it handles multiple domains better 
(per domain spam settings)

-Matt
**
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote confirms that this email message has been swept
for the presence of computer viruses and is believed to be clean.
**


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Martin Hepworth
All
Sorry that should should be http://www.rulesemporium.com/
also worthwhile adding in the surbl.org plugin for SA, which adds alot 
less CPU time than the bigvil etc rules.

--
Martin Hepworth
Snr Systems Administrator
Solid State Logic
Tel: +44 (0)1865 842300
Martin Hepworth wrote:
Matthew
Spamassassin needs quite a bit of tweaking above the out of the box 
setup. I run about 7000 messages a day here, 70% spam, .5% virus (clamav 
and Sophos), very very rarely a FP. I get bove 99% hit rate after adding 
in bayes, serveral additional rules from www.rulesemporium.org and the 
URI checkes. Runs on a 600mhz celeron with load avg  .5

--
Martin Hepworth
Snr Systems Administrator
Solid State Logic
Tel: +44 (0)1865 842300
Matthew Crocker wrote:

On May 17, 2004, at 2:35 PM, Claydon, Tom wrote:
Doing evaluations on anti-spam, anti-virus solutions, and ran across
this:
http://www.barracudanetworks.com/
Looks like a good box -- even won an Editor's Choice award from Network
Computing recently.
Does anyone on list have any experience with these boxes? If so, how are
they with false positives, quarantine capabilities, etc?
Tom,
 I have a Barracuda Spam Firewall 400,  We handle about 9k users and 
the thing is AMAZING!

My old setup was 4 dual-PIII 550Mhz, 1 GIg RAM running 
Qmail/Qmail-ldap/spamassasin/F-Secure AV.   My inbox would get 300+ 
spams/day, many of them not tagged at all
This setup would melt  on a regular basis when spam floods would come in

My current setup is a Barracuda 400 and 1 inbound mail server (dual 
P-III 550Mhz...).  My inbox now gets 5 untagged spams/day and about 10 
quarantined.
This setup has been able to handle everything thrown at it so far with 
no  noticeable performance hit

My customers love it,  I love it,  best  thing I have purchased in the 
last 12 months.  Very low false positives and high hit rate.  The 
quarantine box is very easy to handle for users,  they will get an 
e-mail once per day with a list of messages and links to whitelist, 
deliver or delete.  When they click on a  link they will connect/log 
into the Barracuda.  They can manage their own Bayesian filters from 
the quarantine interface.

It really has had a dramatic effect on my spam,  I'm wondering what 
I'll be doing with all my spare time now that I don't have to manage 
my mail server.

I was watching the message log one day and noticed a spam flood in 
action.

10 messages came in and went to customers tagged about 0.5 or so
10 messages came in and went to customers tagged as ::SPAM:: with a 
score of 3.7 or so
10 messages came in and went to quarantine with a score of 5.5 or so
a bazillion messages were blocked with a score  20

It learned very fast.
My Barracuda is currently blocking 500k+ messages/day
current stats  (installed 13 days)
Blocked (SPAM) :7453215
Blocked (Virus)  : 24600
Quarantined   : 82170
Tagged: 31552
Allowed   : 580876
Average Queue latency :  4 seconds
Unique Recipients : 8245
I just signed up as a reseller and I'm building a managed mail 
solution around it.

If you are an ISP I recommend you get a 400 series or higher.  You can 
customize the web interface a bit and it handles multiple domains 
better (per domain spam settings)

-Matt
**
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote confirms that this email message has been swept
for the presence of computer viruses and is believed to be clean.
**
**
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote confirms that this email message has been swept
for the presence of computer viruses and is believed to be clean.
**


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Matthew Crocker

On May 18, 2004, at 4:13 AM, Martin Hepworth wrote:
Matthew
Spamassassin needs quite a bit of tweaking above the out of the box 
setup. I run about 7000 messages a day here, 70% spam, .5% virus 
(clamav and Sophos), very very rarely a FP. I get bove 99% hit rate 
after adding in bayes, serveral additional rules from 
www.rulesemporium.org and the URI checkes. Runs on a 600mhz celeron 
with load avg  .5


I agree that everything the Barracuda does can be done by hand.  I had 
a choice of either spending $4k for a 'set it and forget it' type spam 
solution or continue to spend days per month of my time tweaking my old 
setup.   I chose to go with the commercial route which will easily save 
me $$ and more importantly frustration over the course of this year.  I 
can spend my time building my business now instead of tweaking my mail 
server.

Barracuda is built on open source, It boots LILO then goes into 
'secret' mode.  I don't think they added any black magic to the box.  
They just assembled the open source parts and shrink wrapped it into a 
very easy to manage solution.

-Matt


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Martin Hepworth
Matt
I agree that everything the Barracuda does can be done by hand.  I had a 
choice of either spending $4k for a 'set it and forget it' type spam 
solution or continue to spend days per month of my time tweaking my old 
setup.   I chose to go with the commercial route which will easily save 
me $$ and more importantly frustration over the course of this year.  I 
can spend my time building my business now instead of tweaking my mail 
server.

Barracuda is built on open source, It boots LILO then goes into 'secret' 
mode.  I don't think they added any black magic to the box.  They just 
assembled the open source parts and shrink wrapped it into a very easy 
to manage solution.

-Matt

I prob spend ay most a couple of hours per week tweeking the thing now..
depends on whether you can squease the 4k out of the bean counters up 
front...:-)

--
Martin Hepworth
Snr Systems Administrator
Solid State Logic
Tel: +44 (0)1865 842300
**
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote confirms that this email message has been swept
for the presence of computer viruses and is believed to be clean.
**


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Majdi S. Abbas

On Mon, May 17, 2004 at 02:26:37PM -0700, Jared B. Reimer wrote:
 This is a pretty serious flaw IMHO, if it is (in fact) true.  qmail isn't 
 the only mailer that behaves this way.  It looks like they may have tried 
 to kludge their way around this with LDAP in the case of MS Exchange, which 
 also does asynchronous bouncing of undeliverable mail IIRC.

Quite frankly, I'm at a loss as to why anyone would wish to accept
and queue mail that they cannot deliver.  Queuing everything just allocates
disk unnecessarily and results in a lot of delayed bounce backscatter, 
almost always directed at a third party (in the common case of spoofed from: 
headers).

Accepting everything simply because you don't wish to give away
valid addresses doesn't work; the spam bots just jabber more loudly at you.
In the past year I've had two domains joe jobbed, generating thousands of
those helpful delayed bounce messages per hour for my role accounts.

If, after RCPT TO, you do not have a valid destination, just 
refuse it.  My role accounts thank you.

--msa


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Valdis . Kletnieks
On Tue, 18 May 2004 10:11:20 PDT, Majdi S. Abbas said:
   Quite frankly, I'm at a loss as to why anyone would wish to accept
 and queue mail that they cannot deliver.  Queuing everything just allocates
 disk unnecessarily and results in a lot of delayed bounce backscatter, 
 almost always directed at a third party (in the common case of spoofed from: 
 headers).

Well.. you're somewhat right - *IF* the mail gateway is able to make the
determination quickly and definitively, reacting as soon as you see the RCPT TO:
is a good idea.  However, that can be a big 'if' in some configurations...

Traditionally, accept and queue was a reasonable way for a gateway
mail relay to function (and if you think about it, it's usually the ONLY way
for an off-site secondary MX to function).  You'd accept and queue everything,
and then forward it to an internal machine that actually knew what mailboxes
were valid addresses.  If you don't do that, then you have to make your
authentication system visible to machines on your DMZ, which has it's
own touchy implications

For high-volume sites, there are also firewall state issues - if you're getting
100K messages/hour, and each one has to be open for 5 seconds because of
authentication issues on the RCPT TO:, you'll average 138 open connections.
If you accept, queue, and deal with it later, you can get it down to 1 second
and then you only average 27 open connections (numbers for illustration
purposes only). 


pgp5dpZlklTp0.pgp
Description: PGP signature


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Christopher X. Candreva
On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:
and then forward it to an internal machine that actually knew what mailboxes
were valid addresses.  If you don't do that, then you have to make your
authentication system visible to machines on your DMZ, which has it's
own touchy implications
Or push a list of valid addresses to the secondaries that they keep locally 
and use, update as needed.  You don't need to 'authenticate' -- just know 
what is/isn't valid.

For a few hundred, or a few thousand accounts rsync/ssh/make could do the 
job.  If you're AOL, I'm sure there is a solution too.

==
Chris Candreva  -- [EMAIL PROTECTED] -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Valdis . Kletnieks
On Tue, 18 May 2004 14:52:54 EDT, Christopher X. Candreva [EMAIL PROTECTED]  said:

 Or push a list of valid addresses to the secondaries that they keep locally 
 and use, update as needed.  You don't need to 'authenticate' -- just know 
 what is/isn't valid.

Remember to ask the auditors what they think of having such a list on
a box in the DMZ. ;)


pgpoKnYb5wORg.pgp
Description: PGP signature


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Valdis . Kletnieks
On Tue, 18 May 2004 14:31:21 CDT, Steve Drees said:

 if I 0wn your mail gateway  I can generate a list of valid accounts over
 time. On a busy host over a short period of time.

So your auditor wouldn't mind if you kept an unencrypted list of credit card
numbers on a DMZ box, because if somebody hacks the box they can gather those
over time? :)



pgp04uaZYWNhR.pgp
Description: PGP signature


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Christopher X. Candreva
On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:
So your auditor wouldn't mind if you kept an unencrypted list of credit card
numbers on a DMZ box, because if somebody hacks the box they can gather those
over time? :)
This is hardly the same thing.  E-mail addresses are public, credit card 
numbers aren't. Email addresses can be gotten by brute-force checking fairly 
easily without even cracking the machine.  card numbers can't.

What would your auditor think about your secondary MX being used as a DOS 
amplifier because it sends out thousands of bogus bounces to forged 
addresses  ?

==
Chris Candreva  -- [EMAIL PROTECTED] -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Todd Vierling

On Mon, 17 May 2004, Jared B. Reimer wrote:

: We had this problem when our inbound-smtp server ( the server the
: barracuda is dumping mail to) was accepting all RCPT TOs

: This is a pretty serious flaw IMHO, if it is (in fact) true.  qmail isn't
: the only mailer that behaves this way.

And, regardless of what the Barracuda box did, you should fix your qmail
install.  This behavior is no longer considered acceptable by the 'net at
large, because accept-then-bounce is the biggest cause of virus spew
bounceback spam.

(As a result, people have begun widely blocking MXs that accept-then-bounce.
You'd do yourself quite a favor to convert to reject-at-SMTP now, before you
get blocked too.)

-- 
-- Todd Vierling [EMAIL PROTECTED] [EMAIL PROTECTED]


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Valdis . Kletnieks
On Tue, 18 May 2004 15:48:28 EDT, Christopher X. Candreva [EMAIL PROTECTED]  said:

 What would your auditor think about your secondary MX being used as a DOS 
 amplifier because it sends out thousands of bogus bounces to forged 
 addresses  ?

You're missing the main point - that sometimes things are done in ways that are
sub-optimal or even pessimal from the technical standpoint, because some other
consideration interferes.  Yes, it *would* be nice if everybody in the world
was able to DTRT on their outward-facing gateway and send back an immediate 550
on a RCPT TO: in order to stop stuff right up front.  However, this implies
getting buy-in and resources of all the appropriate people.

I'm sure *everybody* has had at least one Good Idea either totally shot down or
mutated beyond recognition because it wouldn't pass auditors (either internal
or external), or because it involved purchasing from Company X because X is the
only one with the feature support, but you'll never get that purchase order
approved by the it must be Company Y gear manager, or because deploying it
would involve getting buy-in from somebody in applications development, and
they don't understand why the urgency on this new feature you need them to
add...



pgp75RcbrzZok.pgp
Description: PGP signature


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Todd Vierling

On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:

:  Quite frankly, I'm at a loss as to why anyone would wish to accept
:  and queue mail that they cannot deliver.

: Well.. you're somewhat right - *IF* the mail gateway is able to make the
: determination quickly and definitively,

That if is rapidly becoming a *requirement*.  I invite you to participate
in [EMAIL PROTECTED] is you somehow feel differently.

: Traditionally, accept and queue was a reasonable way for a gateway
: mail relay to function (and if you think about it, it's usually the ONLY way
: for an off-site secondary MX to function).

Then make the offsite MX use a user list, or else don't use an offsite MX at
all.  Sending mail exchangers will retry when the recipient servers are
down; that's mandated by SMTP.  You don't need an offsite secondary MX that
has no access to a valid address list.

Sorry to burst your bubble, but as of this year, where the levels of virus
bounce spam as hreached obscene levels, this is no longer a valid excuse.

: For high-volume sites, there are also firewall state issues

Then upgrade your firewall.  This is certainly not a valid excuse.

-- 
-- Todd Vierling [EMAIL PROTECTED] [EMAIL PROTECTED]


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Todd Vierling

On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:

: Yes, it *would* be nice if everybody in the world was able to DTRT on
: their outward-facing gateway and send back an immediate 550 on a RCPT TO:
: in order to stop stuff right up front.  However, this implies getting
: buy-in and resources of all the appropriate people.

Blocking outbound mail from such entities is a pretty good way to get
buy-in.  (Yes, there's a DNSBL in work to enumerate such systems.)

-- 
-- Todd Vierling [EMAIL PROTECTED] [EMAIL PROTECTED]


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Christopher X. Candreva
On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:
You're missing the main point - that sometimes things are done in ways 
that are sub-optimal or even pessimal from the technical standpoint, 
because some other consideration interferes.  Yes, it *would* be nice if 
everybody in the world
Oh, I know that point very well. It's why we're in the mess we are in, 
because no one could budget to set things up properly.

It's the same arguement we heard as to why people couldn't close their open 
relays. To which we eventually responded OK, if that's what you have to do. 
Let us know when you have fixed it and we'll accept mail from you again. 
You'll have to use a different server though, 'cause it's blocked now.

It's not that I missed the point. I don't care if YOU can't afford it. 
That's your problem. I'm not going to let it affect MY network.

==
Chris Candreva  -- [EMAIL PROTECTED] -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Christopher X. Candreva

You're missing the main point - that sometimes things are done in ways 
that are sub-optimal or even pessimal from the technical standpoint, 
because some other consideration interferes.  Yes, it *would* be nice if 
everybody in the world
But if you really need a reason to convince someone who won't get their head 
out of their . . . the sand -- You can probably cut in half the number of 
viruses you have to scan if you reject invalid addresses up front, meaning 
you can buy a smaller/ fewer virus scanner(s).

Which means the companies making them have absolutely no incentive to add 
this feature.

==
Chris Candreva  -- [EMAIL PROTECTED] -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Valdis . Kletnieks
On Tue, 18 May 2004 16:13:20 EDT, Todd Vierling said:
 On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:
 
 : Yes, it *would* be nice if everybody in the world was able to DTRT on
 : their outward-facing gateway and send back an immediate 550 on a RCPT TO:
 : in order to stop stuff right up front.  However, this implies getting
 : buy-in and resources of all the appropriate people.
 
 Blocking outbound mail from such entities is a pretty good way to get
 buy-in.  (Yes, there's a DNSBL in work to enumerate such systems.)

When it gets built, will it list AOL.COM for not rejecting at the original RCPT
TO?  Or Hotmail.com? (Consider the following 2 pieces of mail - mail comes in
from someplace with a From: @aol.com, our Listserv tries to process the command
(which was actually spam, but it's hard to tell that until you try to handle
it), and send the response back... notice that AOL didn't 550 my mail, but
accepted and bounced it. Similarly for the hotmail.com mail - the spam comes
in, and they accept-and-bounce our response rather than 550 it (although to be fair, 
they
usually DO manage to 550 this stuff).

Yes, it's generally a good idea - but not one that everybody can carry out all the 
time.

You don't like it, take it up with the AOL and Hotmail guys, not me, OK? :)

---BeginMessage---
The original message was received at Mon, 17 May 2004 04:56:55 -0400 (EDT)
from listserv.vt.edu [198.82.161.192]


*** ATTENTION ***

Your e-mail is being returned to you because there was a problem with its
delivery.  The address which was undeliverable is listed in the section
labeled: - The following addresses had permanent fatal errors -.

The reason your mail is being returned to you is listed in the section
labeled: - Transcript of Session Follows -.

The line beginning with  describes the specific reason your e-mail could
not be delivered.  The next line contains a second error message which is a
general translation for other e-mail servers.

Please direct further questions regarding this message to your e-mail
administrator.

--AOL Postmaster



   - The following addresses had permanent fatal errors -
[EMAIL PROTECTED]

   - Transcript of session follows -
... while talking to air-xg01.mail.aol.com.:
 RCPT To:[EMAIL PROTECTED]
 550 MAILBOX NOT FOUND
550 [EMAIL PROTECTED]... User unknown
Reporting-MTA: dns; rly-xg05.mx.aol.com
Arrival-Date: Mon, 17 May 2004 04:56:55 -0400 (EDT)

Final-Recipient: RFC822; [EMAIL PROTECTED]
Action: failed
Status: 5.1.1
Remote-MTA: DNS; air-xg01.mail.aol.com
Diagnostic-Code: SMTP; 550 MAILBOX NOT FOUND
Last-Attempt-Date: Mon, 17 May 2004 04:56:58 -0400 (EDT)
Received: from  listserv.vt.edu (listserv.vt.edu [198.82.161.192]) by rly-xg05.mx.aol.com (v99_r4.3) with ESMTP id MAILRELAYINXG56-47040a87e5628e; Mon, 17 May 2004 04:56:54 -0400
Received: from listserv.vt.edu (LOCALHOST [127.0.0.1])
	by listserv.vt.edu (8.12.10/8.12.10/LISTSERV) with ESMTP id i4H85h43139864
	for [EMAIL PROTECTED]; Mon, 17 May 2004 04:56:54 -0400
Date: Mon, 17 May 2004 04:56:54 -0400
From: L-Soft list server at LISTSERV.VT.EDU (1.8e)
  [EMAIL PROTECTED]
Subject: Re: start making money
To: [EMAIL PROTECTED]
Message-ID:   [EMAIL PROTECTED]
X-AOL-IP: 198.82.161.192
X-AOL-SCOLL-SCORE: 0:XXX:XX
X-AOL-SCOLL-URL_COUNT: 0
---End Message---
---BeginMessage---
This is an automatically generated Delivery Status Notification.

Delivery to the following recipients failed.

   [EMAIL PROTECTED]



Reporting-MTA: dns;mc2-f24.hotmail.com
Received-From-MTA: dns;listserv.vt.edu
Arrival-Date: Sun, 11 Apr 2004 22:07:13 -0700

Original-Recipient: 
Final-Recipient: rfc822;[EMAIL PROTECTED]
Action: failed
Status: 5.0.0
Diagnostic-Code: smtp;550 Requested action not taken: mailbox unavailable

---BeginMessage---
Your message  dated Sun, 11  Apr 04  23:05:06 GMT with  subject Á÷ÀåÀηÐ
½ÅûÇϼ¼¿ä 6°³¿ùÀÌ»ó±Ù¹«ÀÚ clrqy lhu iotgnuhca has been submitted to the
moderator of the TURBVIS list: [EMAIL PROTECTED]

---End Message---
---End Message---


pgpGJac7Wuha5.pgp
Description: PGP signature


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Christopher X. Candreva
On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:
When it gets built, will it list AOL.COM for not rejecting at the original 
RCPT TO?  Or Hotmail.com? (Consider the following 2 pieces of mail - mail
Don't know about hotmail, but AOL is working on this.  You might want to 
check out that SPAM-L list, if this is something you are interested in.

Once AOL starts doing it -- you can bet they will be one of the ones 
blocking on it.

==
Chris Candreva  -- [EMAIL PROTECTED] -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Valdis . Kletnieks
On Tue, 18 May 2004 16:56:30 EDT, Christopher X. Candreva [EMAIL PROTECTED]  said:

 But if you really need a reason to convince someone who won't get their head 
 out of their . . . the sand -- You can probably cut in half the number of 
 viruses you have to scan if you reject invalid addresses up front, meaning 
 you can buy a smaller/ fewer virus scanner(s).
 
 Which means the companies making them have absolutely no incentive to add 
 this feature.

Right.  Mirapoints are that way too (at least in our configuration).  And yes,
we'll probably have to buy a 5th Mirapoint and/or upgrade our current 4 sooner
because of it - but the incremental cost for that is *still* lower than the
cost of replacing them with another vendor's gear

Now how do you explain to the CFO that in order to get around a $50K upgrade
to the current gear, you want to spend $200K to bring in another vendor? :)




pgpszl7fhhuy6.pgp
Description: PGP signature


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Valdis . Kletnieks
On Tue, 18 May 2004 17:11:54 EDT, Christopher X. Candreva [EMAIL PROTECTED]  said:

 Don't know about hotmail, but AOL is working on this.  You might want to 
 check out that SPAM-L list, if this is something you are interested in.

Other than knowing that it's a good idea if you can do it, but sometimes not
doable with the resources at hand, I don't have any special interest in it...

 Once AOL starts doing it -- you can bet they will be one of the ones 
 blocking on it.

That's going to pretty much torpedo the concept of secondary MX's.



pgpEAdGIaNjf2.pgp
Description: PGP signature


backscatter hosts (was: Re: Barracuda Networks Spam Firewall)

2004-05-18 Thread Steven Champeon

on Tue, May 18, 2004 at 04:01:40PM -0400, Todd Vierling wrote:
 
 On Mon, 17 May 2004, Jared B. Reimer wrote:
 
 : We had this problem when our inbound-smtp server ( the server the
 : barracuda is dumping mail to) was accepting all RCPT TOs
 
 : This is a pretty serious flaw IMHO, if it is (in fact) true.  qmail isn't
 : the only mailer that behaves this way.
 
 And, regardless of what the Barracuda box did, you should fix your qmail
 install.  This behavior is no longer considered acceptable by the 'net at
 large, because accept-then-bounce is the biggest cause of virus spew
 bounceback spam.
 
 (As a result, people have begun widely blocking MXs that accept-then-bounce.
 You'd do yourself quite a favor to convert to reject-at-SMTP now, before you
 get blocked too.)

At present, thanks to a recent massive joe job against one of the
domains we host, I've got a list of ~16100 mailhosts that I no longer
accept null sender mail* from. Most of them are running qmail, based on
some unscientific analysis I did when compiling the list. All of them
accepted, then bounced, mail from spammers HELO'ing with that domain
back to the victim. Several hundred also sent us DSNs from virus
forgeries. All of them were unnecessary.

Sad, really, especially given that patches exist to fix this problem.

Steve
* or postmaster/Symantec_Antivirus/Webshield/VirusWall/JCT/etc.

-- 
hesketh.com/inc. v: +1(919)834-2552 f: +1(919)834-2554 w: http://hesketh.com
Buy Cascading Style Sheets: Separating Content from Presentation, 2/e today!
http://www.amazon.com/exec/obidos/ASIN/159059231X/heskecominc-20/ref=nosim/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Todd Vierling

On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:

:  Blocking outbound mail from such entities is a pretty good way to get
:  buy-in.  (Yes, there's a DNSBL in work to enumerate such systems.)
:
: When it gets built, will it list AOL.COM for not rejecting at the original
: RCPT TO?

AOL happens to be working with the anti-spam community by converting their
MXs to do reject-at-SMTP.  (See SPAM-L archives.  They're quite aware of the
problem and are in fact addressing it.)

: Or Hotmail.com?

Strange; I've received direct SMTP rejections from Hotmail plenty of times
recently.  Given the size of that entity, I'm sure the DNSBL admin in
question would try to work with them (and Hotmail admins have also shown
themselves on SPAM-L); but without any movement, yes, it'd be a candidate
for listing.

-- 
-- Todd Vierling [EMAIL PROTECTED] [EMAIL PROTECTED]


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Todd Vierling

On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:

:  Don't know about hotmail, but AOL is working on this.  You might want to
:  check out that SPAM-L list, if this is something you are interested in.
:
: Other than knowing that it's a good idea

s/a good idea/an emerging requirement/
(and for one definition of the idea, s/a good idea/a soon-to-be RFC MUST/)

: if you can do it,

s/can do it/wish to send mail, or at least DSNs, to most of the 'net soon/

: but sometimes not doable with the resources at hand,

s/.*//

Those of us under a deluge of virus bounce spew just don't care anymore.
If you don't reject at SMTP time, you're now a major part of the problem.
(As a straw example, I happen to block, on a personal 12 user domain, almost
20k bounce spew attempts per day.  That's simply untenable anymore.)

:  Once AOL starts doing it -- you can bet they will be one of the ones
:  blocking on it.
:
: That's going to pretty much torpedo the concept of secondary MX's.

And what's the gain of secondary MX's that don't have access to a valid
address list?  Ever since the advent of globally deployed, permanently
connected sending MX's, offsite secondary MX machines have become moot.
SMTP mandates that a missed connection is equivalent to a 4xx error, in that
the sender is to retry delivery later.  That obviates any need for an
offsite secondary MX in today's world.

Unauditable SMTP transport -- that is, SMTP where neither the sender nor
recipient values are verifiable -- is no longer a workable solution.  The
problems with that model are reaching critical mass, and if you don't think
it's a problem now, just trust me; you'll be a believer soon enough.

-- 
-- Todd Vierling [EMAIL PROTECTED] [EMAIL PROTECTED]


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Eric A. Hall


On 5/18/2004 4:22 PM, [EMAIL PROTECTED] wrote:

 That's going to pretty much torpedo the concept of secondary MX's.

Folks still run those? No really, most people I know terminated their
off-site secondaries a couple of years ago at least.

The only secondary you can reasonably use these days has (1) a copy of
your user list, and (2) a clone of your spam filters.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Per Gregers Bilse

On May 18,  5:22pm, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
  Once AOL starts doing it -- you can bet they will be one of the ones 
  blocking on it.
 
 That's going to pretty much torpedo the concept of secondary MX's.

Not to suddenly burst back, but ...

Second/terti/etc-ary MXers really belong in a bygone age anyway.

There was a time when IP was a novelty, and UUCP was king.  Then there
was a time when UUCP was getting long in the tooth, but politics
dictated an IP Internet that was not universally connected.  Somewhere
in the meantime, leading a life of its own, was something called
FidoNet (http://www.fidonet.org) and something else called BITNET
(http://www.bitnet.org), but as of today both are for pub brawls only.

This is of course an opportune moment to recall that the 10th anniversary
of the shutdown of the successor of mcvax.bitnet, namely mcsun.bitnet,
was in January of this year.  http://www.mcvax.org/mcsun/

The fundamental idea of less preferred MXs was to get the mail delivered
through a backdoor, not reachable via IP routing from the originator.
Think multihoming for email, keeping in mind that email routing is
disjoint from IP routing: a genuine secondary MX would be able to,
one way or another, deliver the mail, by means not accessible to the
originator.  This inaccessibility would be because the more preferred
MX was unreachable for one of several reasons (host down, network down,
or politics enabled), but, whatever the reason, one wanted to find a
way of routing around the problem.

For a long time since then, backup MXs have been seen as a kind of
value-added courtesy service; they serve no really useful purpose,
but look good on a checklist.  In practice, of course, in the current
Internet it rarely matters on which host an undelivered email is spinning
in the spool area.

Best,

  -- Per



Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Eric A. Hall


On 5/18/2004 6:44 PM, Per Gregers Bilse wrote:

 For a long time since then, backup MXs have been seen as a kind of 
 value-added courtesy service; they serve no really useful purpose

well, they're handy for centralizing filters against multiple domains, if
you're willing to put your various primaries at the mercy of the filter
service, and if the filter knows your valid recipients. what with
ldap-smart servers and fancy routing, this isn't even hard anymore.

but general backup MX is long-time dead. first the spammers killed our
outbound flexibility by forcing everybody to close their relays, and then
they killed our inbound flexibility by forcing everybody to close their
generic backup MX paths. that cracking sound is stress fractures as the
network gets more rigid.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Per Gregers Bilse

On May 18,  7:03pm, Eric A. Hall [EMAIL PROTECTED] wrote:
  For a long time since then, backup MXs have been seen as a kind of 
  value-added courtesy service; they serve no really useful purpose
 
 well, they're handy for centralizing filters against multiple domains, if
 you're willing to put your various primaries at the mercy of the filter
 service, and if the filter knows your valid recipients. what with
 ldap-smart servers and fancy routing, this isn't even hard anymore.

But this only means that the primary, and only, MX should be the
filter service MX; in turn, it would deliver sanitized email to
its real destination.

An amusing twist on this is then that the final recipients could
be listed as less preferred MXs -- if the filter service MX is down,
one would accept all mail unfiltered, rather than wait until the
primary, filter service, MX is back on line.

While this would be a legitimate use of less preferred MXs, even if it
practically turns the original rationale upside down, I would generally
suggest to opt for uncompromising reliablity on a filter service MX,
and fall back on DNS changes for disaster recovery, rather than receive
tons of junk unfiltered mail whenever there's a glitch on the primary,
filter server, MX.

But your point is technically correct.  Only goes to show how much
mileage there is to be had from an otherwise very simple protocol
extension.-)

Best,

  -- Per



Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Eric A. Hall


On 5/17/2004 4:00 PM, Joe Boyce wrote:

 I Googled around and found a bunch of rulesets that once installed,
 started tagging those hard to get messages.
 
 http://www.rulesemporium.com/ is a good place to start if anybody else
 is running Spam Assassin straight out of the box.

There's one rule that will wipe out ~90% of spam, but nobody seems to have
written it yet.

  if URL IP addr is in China then score=100

support for a generic lookup list of cidr blocks would get another 9%

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Barracuda Networks Spam Firewall

2004-05-18 Thread Petri Helenius
Eric A. Hall wrote:
There's one rule that will wipe out ~90% of spam, but nobody seems to have
written it yet.
 if URL IP addr is in China then score=100
 

Where does this leave the 70% which would only match the rule;
if URL IP addr is in FL,USA then score=42
?
Pete
support for a generic lookup list of cidr blocks would get another 9%
 




Re: Barracuda Networks Spam Firewall

2004-05-17 Thread Matthew Crocker

On May 17, 2004, at 2:35 PM, Claydon, Tom wrote:
Doing evaluations on anti-spam, anti-virus solutions, and ran across
this:
http://www.barracudanetworks.com/
Looks like a good box -- even won an Editor's Choice award from Network
Computing recently.
Does anyone on list have any experience with these boxes? If so, how 
are
they with false positives, quarantine capabilities, etc?

Tom,
 I have a Barracuda Spam Firewall 400,  We handle about 9k users and 
the thing is AMAZING!

My old setup was 4 dual-PIII 550Mhz, 1 GIg RAM running 
Qmail/Qmail-ldap/spamassasin/F-Secure AV.   My inbox would get 300+ 
spams/day, many of them not tagged at all
This setup would melt  on a regular basis when spam floods would come in

My current setup is a Barracuda 400 and 1 inbound mail server (dual 
P-III 550Mhz...).  My inbox now gets 5 untagged spams/day and about 10 
quarantined.
This setup has been able to handle everything thrown at it so far with 
no  noticeable performance hit

My customers love it,  I love it,  best  thing I have purchased in the 
last 12 months.  Very low false positives and high hit rate.  The 
quarantine box is very easy to handle for users,  they will get an 
e-mail once per day with a list of messages and links to whitelist, 
deliver or delete.  When they click on a  link they will connect/log 
into the Barracuda.  They can manage their own Bayesian filters from 
the quarantine interface.

It really has had a dramatic effect on my spam,  I'm wondering what 
I'll be doing with all my spare time now that I don't have to manage my 
mail server.

I was watching the message log one day and noticed a spam flood in 
action.

10 messages came in and went to customers tagged about 0.5 or so
10 messages came in and went to customers tagged as ::SPAM:: with a 
score of 3.7 or so
10 messages came in and went to quarantine with a score of 5.5 or so
a bazillion messages were blocked with a score  20

It learned very fast.
My Barracuda is currently blocking 500k+ messages/day
current stats  (installed 13 days)
Blocked (SPAM) :7453215
Blocked (Virus)  : 24600
Quarantined   : 82170
Tagged: 31552
Allowed   : 580876
Average Queue latency :  4 seconds
Unique Recipients : 8245
I just signed up as a reseller and I'm building a managed mail solution 
around it.

If you are an ISP I recommend you get a 400 series or higher.  You can 
customize the web interface a bit and it handles multiple domains 
better (per domain spam settings)

-Matt


Re: Barracuda Networks Spam Firewall

2004-05-17 Thread Jared B. Reimer
We have done an eval of this same product (model 400).  It is very cool in 
virtually every regard except one: performance.  We were facing 1+ hour 
mail delays (!) through the device when pumping less than 1,000,000 
messages per day through it.   Given that they claim it can handle ten 
times that much, I am left wondering what happened.  Very disappointing in 
that regard; the eval unit is being shipped back as a result.  -- Jared

At 11:35 AM 5/17/2004, Claydon, Tom wrote:

Doing evaluations on anti-spam, anti-virus solutions, and ran across
this:
http://www.barracudanetworks.com/
Looks like a good box -- even won an Editor's Choice award from Network
Computing recently.
Does anyone on list have any experience with these boxes? If so, how are
they with false positives, quarantine capabilities, etc?
Thanks,
Tom Claydon
Dobson Telephone

##  Jared B. Reimer [EMAIL PROTECTED]
##  CTO / The River Internet Access Co.
##  +1 (877) 88-RIVER x170 ||  http://www.theriver.com/


Re: Barracuda Networks Spam Firewall

2004-05-17 Thread Joe Boyce


Monday, May 17, 2004, 12:32:29 PM, you wrote:

MC My old setup was 4 dual-PIII 550Mhz, 1 GIg RAM running
MC Qmail/Qmail-ldap/spamassasin/F-Secure AV.   My inbox would get 300+
MC spams/day, many of them not tagged at all
MC This setup would melt  on a regular basis when spam floods would come in

Not to thread jack or anything, but when I first moved our cluster to
Spam Assassin, I was disappointed at the amount of messages that would
get past Spam Assassin at even a low threshold of 2.

I Googled around and found a bunch of rulesets that once installed,
started tagging those hard to get messages.

http://www.rulesemporium.com/ is a good place to start if anybody else
is running Spam Assassin straight out of the box.


Regards,

Joe Boyce
---
InterStar, Inc. - Shasta.com Internet
Phone: +1 (530) 224-6866 x105
Email: [EMAIL PROTECTED]










RE: Barracuda Networks Spam Firewall

2004-05-17 Thread Christopher Brown

We've had a 400 up for 3 months now, very nice box.  It's doing pretty
good with handling false positives, and the updates are very frequent.  

One of the nice things for us is the ability to do per domain / per user
quarantines for clients that want that ability.  It also has an
'Exchange Accelerator' to tie into LDAP on exchange servers.

We've not had any serious through put issues so far, but only pushing
500K mails a day so far.

Christopher Brown 
Concergent, LLC 
Wichita, Kansas 


-Original Message-
From: Jared B. Reimer [mailto:[EMAIL PROTECTED] 
Sent: Monday, May 17, 2004 3:48 PM
To: Claydon, Tom
Cc: [EMAIL PROTECTED]
Subject: Re: Barracuda Networks Spam Firewall


We have done an eval of this same product (model 400).  It is very cool
in 
virtually every regard except one: performance.  We were facing 1+ hour 
mail delays (!) through the device when pumping less than 1,000,000 
messages per day through it.   Given that they claim it can handle ten 
times that much, I am left wondering what happened.  Very disappointing
in 
that regard; the eval unit is being shipped back as a result.  -- Jared

At 11:35 AM 5/17/2004, Claydon, Tom wrote:


Doing evaluations on anti-spam, anti-virus solutions, and ran across
this:

http://www.barracudanetworks.com/

Looks like a good box -- even won an Editor's Choice award from Network
Computing recently.

Does anyone on list have any experience with these boxes? If so, how
are
they with false positives, quarantine capabilities, etc?

Thanks,
Tom Claydon
Dobson Telephone


##  Jared B. Reimer [EMAIL PROTECTED]
##  CTO / The River Internet Access Co.
##  +1 (877) 88-RIVER x170 ||  http://www.theriver.com/




Re: Barracuda Networks Spam Firewall

2004-05-17 Thread John Neiberger

 Jared B. Reimer [EMAIL PROTECTED] 5/17/04 2:48:16 PM 
We have done an eval of this same product (model 400).  It is very
cool in 
virtually every regard except one: performance.  We were facing 1+
hour 
mail delays (!) through the device when pumping less than 1,000,000 
messages per day through it.   Given that they claim it can handle ten

times that much, I am left wondering what happened.  Very
disappointing in 
that regard; the eval unit is being shipped back as a result.  --
Jared

Did you not receive some basic support from them during your
evaluation? A perceived 90% drop in performance is pretty significant
and I'd imagine that they'd be interested in helping to determine the
cause.

John
--


Re: Barracuda Networks Spam Firewall

2004-05-17 Thread Mike Tancsa
At 05:00 PM 17/05/2004, Joe Boyce wrote:
Not to thread jack or anything, but when I first moved our cluster to
Spam Assassin, I was disappointed at the amount of messages that would
get past Spam Assassin at even a low threshold of 2.
I Googled around and found a bunch of rulesets that once installed,
started tagging those hard to get messages.
Also, use the various RBLs in the scoring.  e.g. add 50% of the threshold 
score if its on spamcop and 25% for some of the other more aggressive 
RBLs.  We have a very high and correct hit rate as a result.  Our users can 
then add white lists for the handful of their contacts that get tagged as 
spam since they are using spam friendly ISPs.

---Mike 



Re: Barracuda Networks Spam Firewall

2004-05-17 Thread Raymond Dijkxhoorn

Hi!

 Not to thread jack or anything, but when I first moved our cluster to
 Spam Assassin, I was disappointed at the amount of messages that would
 get past Spam Assassin at even a low threshold of 2.
 
 I Googled around and found a bunch of rulesets that once installed,
 started tagging those hard to get messages.
 
 http://www.rulesemporium.com/ is a good place to start if anybody else
 is running Spam Assassin straight out of the box.

And if i may plug SURBL if you wanna do that, might help with performance 
also. For example if you run BigEvil you might gain a lot of performance 
by doing that via SURBL.

http://www.surbl.org

Bye,
Raymond.



Re: Barracuda Networks Spam Firewall

2004-05-17 Thread Jared B. Reimer

Did you not receive some basic support from them during your
evaluation? A perceived 90% drop in performance is pretty significant
and I'd imagine that they'd be interested in helping to determine the
cause.
Sadly, they have not responded to my email on the topic, sent four days ago.
However, someone unrelated to the company emailed me off-list saying that 
basically this is a known flaw in the product with back-end systems like 
qmail that asynchronously bounce mail for invalid recipients.  See below quote:

We had this problem when our inbound-smtp server ( the server the 
barracuda is dumping mail to) was accepting all RCPT TOs:   As a result 
dictionary attacks were getting through and creating 'unique recipients' 
on the Barracuda.   As soon as I fixed my mail server to reject with a 220 
error on bogus RCPT TOs  the problem cleared up.
This is a pretty serious flaw IMHO, if it is (in fact) true.  qmail isn't 
the only mailer that behaves this way.  It looks like they may have tried 
to kludge their way around this with LDAP in the case of MS Exchange, which 
also does asynchronous bouncing of undeliverable mail IIRC.

-- Jared



Re: Barracuda Networks Spam Firewall

2004-05-17 Thread jlewis

On Mon, 17 May 2004, Jared B. Reimer wrote:

 We had this problem when our inbound-smtp server ( the server the
 barracuda is dumping mail to) was accepting all RCPT TOs:   As a result
 dictionary attacks were getting through and creating 'unique recipients'
 on the Barracuda.   As soon as I fixed my mail server to reject with a 220
 error on bogus RCPT TOs  the problem cleared up.

 This is a pretty serious flaw IMHO, if it is (in fact) true.  qmail isn't
 the only mailer that behaves this way.  It looks like they may have tried
 to kludge their way around this with LDAP in the case of MS Exchange, which
 also does asynchronous bouncing of undeliverable mail IIRC.

The fault here is with qmail.  The barracuda was doing exactly what it was
designed to do.  qmail can be patched to be smarter (google for qmail
spamcontrol or magic smtpd).  Accept all, then try to bounce, is a recipe
for disaster with today's dictionary attackers and virii that will send to
randomly created destinations from randomly created forged froms.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_