Security Basics mailing list archives
Re: educating rDNS violators
From: "Bryan S. Sampsel" <bsampsel () libertyactivist org>
Date: Sun, 29 Aug 2004 07:58:37 -0600 (MDT)
Authenticated SMTP. Sendmail has it. I've even seen it on some Windows based email servers. Can't remember if Qmail has it or not though... And there's some method of kludging the client to use the POP or IMAP client to send instead of receive. You might also have the client VPN in and their VPN IP is placed into the trusted range for relay...and rDNS wouldn't break anything then. Just a thought. Sincerely, Bryan S. Sampsel LibertyActivist.org Mark Reis said:
A question for those who have implemented rDNS restrictions. In the case of a mail server with roaming users, how do you deal with roaming users? A majority of our users travel to conferences and use secure IMAP and SMTP to send their mail. Perhaps this is a misconception, but I thought that some mail clients attempt to portray themselves as a SMTP server relaying through the main mail server. If we have users off traveling and having their email is blocked while they were connected at a hotel with bad rDNS entries, I'd be getting ticked off calls. Any suggestions? Thanks, Mark --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
--------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- RE: educating rDNS violators, (continued)
- RE: educating rDNS violators David Gillett (Aug 30)
- Re: educating rDNS violators Niek (Aug 26)
- Re: educating rDNS violators Derek Schaible (Aug 30)
- Re: educating rDNS violators JGrimshaw (Aug 24)
- Re: educating rDNS violators James Kelly (Aug 25)
- Re: educating rDNS violators Bryan S. Sampsel (Aug 25)
- Re: educating rDNS violators SMiller (Aug 26)
- Re: educating rDNS violators Derek Schaible (Aug 25)
- Re: educating rDNS violators Mark Reis (Aug 28)
- Re: educating rDNS violators Derek Schaible (Aug 30)
- Re: educating rDNS violators Bryan S. Sampsel (Aug 30)
- Re: educating rDNS violators James Kelly (Aug 25)