[72351] in North American Network Operators' Group
Re: Proxy scanning for spam
daemon@ATHENA.MIT.EDU (Jim Segrave)
Wed Jul 7 08:32:34 2004
Date: Wed, 7 Jul 2004 14:31:51 +0200
From: Jim Segrave <jes@nl.demon.net>
To: "Stephen J. Wilcox" <steve@telecomplete.co.uk>
Cc: "Christopher J. Wolff" <chris@bblabs.com>, nanog@merit.edu
Reply-To: jes@nl.demon.net
Mail-Followup-To: Jim Segrave <jes@nl.demon.net>,
"Stephen J. Wilcox" <steve@telecomplete.co.uk>,
"Christopher J. Wolff" <chris@bblabs.com>, nanog@merit.edu
In-Reply-To: <Pine.LNX.4.44.0407061107400.8894-100000@server2.tcw.telecomplete.net>
Errors-To: owner-nanog-outgoing@merit.edu
On Tue 06 Jul 2004 (11:08 +0100), Stephen J. Wilcox wrote:
>
> On Mon, 5 Jul 2004, Christopher J. Wolff wrote:
>
> >
> > Hello,
> >
> > If I have a network segment connected to a BGP peer, is there a way that I
> > can hang a box of some kind off of that segment that will sniff out and
> > block malicious/spam email before it hits the customers?
>
> policy route your port 25 at an adjacent box.. use some sort of iptables rules
> to translate the ip address of the box and that will work also.
make sure no-one is running a mailserver that expects to do TLS
authentication or similar.
--
Jim Segrave jes@nl.demon.net