[72351] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Proxy scanning for spam

daemon@ATHENA.MIT.EDU (Jim Segrave)
Wed Jul 7 08:32:34 2004

Date: Wed, 7 Jul 2004 14:31:51 +0200
From: Jim Segrave <jes@nl.demon.net>
To: "Stephen J. Wilcox" <steve@telecomplete.co.uk>
Cc: "Christopher J. Wolff" <chris@bblabs.com>, nanog@merit.edu
Reply-To: jes@nl.demon.net
Mail-Followup-To: Jim Segrave <jes@nl.demon.net>,
	"Stephen J. Wilcox" <steve@telecomplete.co.uk>,
	"Christopher J. Wolff" <chris@bblabs.com>, nanog@merit.edu
In-Reply-To: <Pine.LNX.4.44.0407061107400.8894-100000@server2.tcw.telecomplete.net>
Errors-To: owner-nanog-outgoing@merit.edu


On Tue 06 Jul 2004 (11:08 +0100), Stephen J. Wilcox wrote:
> 
> On Mon, 5 Jul 2004, Christopher J. Wolff wrote:
> 
> > 
> > Hello,
> > 
> > If I have a network segment connected to a BGP peer, is there a way that I
> > can hang a box of some kind off of that segment that will sniff out and
> > block malicious/spam email before it hits the customers?
> 
> policy route your port 25 at an adjacent box.. use some sort of iptables rules 
> to translate the ip address of the box and that will work also.

make sure no-one is running a mailserver that expects to do TLS
authentication or similar.

-- 
Jim Segrave           jes@nl.demon.net

home help back first fref pref prev next nref lref last post