Hi,
can anyone recommend me anything that supports SNMP-ALG as per RFC2692?
So far I only managed to find netfilter/iptables should support it, via
a long-time no-progress plugin. However, the plugin simply does not seem
to work (I've done loads of debugging, and as well I only managed to
Internal users: With AUTH - correlate message with authenticated
user,
then forbid mail transmission for them only. I'd rather do that than
slog through RADIUS logs. But, hey, maybe if I had more free time...
Increasing the detail of an audit trail doesnt mean anyone will
Unfortunately, providers seem to prefer unilateral heavy-handed
behavior rather than acting professional. They prefer working out
solutions in isolation or in small closed cabals working in secret in
backrooms rather than working open to public scrutiny in an
association. They prefer to
It's time to take this thread to SPAM-L or
some other spam oriented list.
I strongly disagree. This thread has not been
about spam. For the most part it has dealt with
technical operational issues of email services
and therefore it is right on track for this list.
--Michael Dillon
On Mon, 28 Feb 2005 10:35:53 GMT, [EMAIL PROTECTED] said:
You misunderstand me. I believe *LESS* red tape will mean
better service. Today, an email operator has to deal with
numerous blacklisting and spam-hunting groups, many of which
act in secret and none of which have any accountability,
[ This discussion should be moved to Spam-L. ]
On Mon, Feb 28, 2005 at 10:35:53AM +, [EMAIL PROTECTED] wrote:
You misunderstand me. I believe *LESS* red tape will mean
better service. Today, an email operator has to deal with
numerous blacklisting and spam-hunting groups, many of which
At 4:51 PM + 2/25/05, [EMAIL PROTECTED] wrote:
I'll agree with you on one thing, though -- the whole
business of port 587 is a bit silly overall...why can't the same
authentication schemes being bandied about for 587 be applied to 25,
thus negating the need for another port just for mail
We put our blocks in place some time ago, Mainly on the Cable Modem side. We
found
our userbase was very prone to becoming zombie agents for spam. We did
enhance our static i.p product by allowing statics to have port 25 open, this
averted any real business class customers to continue to
In message [EMAIL PROTECTED], Sean Donelan
writes:
Requiring end-user computers to use authenticated Port 587 and blocking
end-user computers access to port 25 has several advantages:
2. Lets the authenticated mail server conduct additional
anti-virus checks on outgoing mail even if the
On Mon, 2005-02-28 at 11:44 -0600, Kee Hinckley wrote:
At 4:51 PM + 2/25/05, [EMAIL PROTECTED] wrote:
Because that would require providers to act like professionals,
join an Internet Mail Services Association, agree on policies
for mail exchange, and require mail peering agreements in
How effective is rate limiting - can anyone from Comcast reaply to me
offlist, I would be very intersted in results ...
PR
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
John Levine
Sent: Sunday, February 27, 2005 11:20 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL
I'm in a disagreement with ARIN about my application for bulk whois
data. I've got a software program that needs resolve AS numbers to the
Company Name of the owner. The software app has need to do this on a
very high volume. E.g. I run a report that returns the top 100 AS
destinations for my
On Sat, Feb 26, 2005 at 03:10:42PM +0100, JP Velders wrote:
From a security stance (well - partly ;D) I always like to emphasize
that in The Real World port 25 is for traffic between MTA's *and*
submission of mails to the local MTA. So to reduce the chance of one
of my users abusing an Open
On Mon, 28 Feb 2005 16:54:23 EST, Nils Ketelsen said:
An interesting theory. What is the substantial difference? For
me the security implications of allowing the user to bypass our
mailsystem on port 25 and allowing the user to bypass our mailsystem on
port 587 are not as obvious as they
Greetings folks,
(It's been a long time :)
I have some questions about multihoming that I can't seem to find by
Google-ing for answers
1.) What ever happened to (Avi Freedman's?) Multihoming strategy using
DNS(?),
there are links to archives circa 1997 but nothing recent.
2) What is the
On Mon, 28 Feb 2005, Geoff White wrote:
2) What is the preferred or correct way for a relatively small outfit
(a small search engine) to implement Multihoming? Especially when most
of the machines are a VLS cluster so we are not talking about a large
address space here. It seems the outfit
16 matches
Mail list logo