[70530] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Barracuda Networks Spam Firewall

daemon@ATHENA.MIT.EDU (Christopher X. Candreva)
Tue May 18 14:53:29 2004

Date: Tue, 18 May 2004 14:52:54 -0400 (EDT)
From: "Christopher X. Candreva" <chris@westnet.com>
To: nanog@merit.edu
In-Reply-To: <200405181737.i4IHbMLb004770@turing-police.cc.vt.edu>
Errors-To: owner-nanog-outgoing@merit.edu


On Tue, 18 May 2004 Valdis.Kletnieks@vt.edu wrote:

> and then forward it to an internal machine that actually knew what mailboxes
> were valid addresses.  If you don't do that, then you have to make your
> authentication system visible to machines on your DMZ, which has it's
> own touchy implications....

Or push a list of valid addresses to the secondaries that they keep locally 
and use, update as needed.  You don't need to 'authenticate' -- just know 
what is/isn't valid.

For a few hundred, or a few thousand accounts rsync/ssh/make could do the 
job.  If you're AOL, I'm sure there is a solution too.

==========================================================
Chris Candreva  -- chris@westnet.com -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/

home help back first fref pref prev next nref lref last post