Security Basics mailing list archives

Re: educating rDNS violators


From: "Bryan S. Sampsel" <bsampsel () libertyactivist org>
Date: Sun, 29 Aug 2004 07:58:37 -0600 (MDT)

Authenticated SMTP.  Sendmail has it.  I've even seen it on some Windows
based email servers.  Can't remember if Qmail has it or not though...

And there's some method of kludging the client to use the POP or IMAP
client to send instead of receive.

You might also have the client VPN in and their VPN IP is placed into the
trusted range for relay...and rDNS wouldn't break anything then.  Just a
thought.

Sincerely,

Bryan S. Sampsel
LibertyActivist.org


Mark Reis said:
A question for those who have implemented rDNS restrictions.

In the case of a mail server with roaming users, how do you deal with
roaming users?  A majority of our users travel to conferences and use
secure IMAP and SMTP to send their mail. Perhaps this is a
misconception, but I thought that some mail clients attempt to portray
themselves as a SMTP server relaying through the main mail server.  If
we have users off traveling and having their email is blocked while they
were connected at a hotel with bad rDNS entries, I'd be getting ticked
off calls.

Any suggestions?

Thanks,
Mark

---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class
sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills
of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------



---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: