On Wed, 23 Aug 2000 [EMAIL PROTECTED] wrote:

> Somewhere along this thread someone forgot to ask just exactly what abuse 
> the original post wanted to prevent.  I can't block a Telnet connection to 
> my SMTP port, it's a legitimate TCP connection.  I can detect that's 
> Telnet by the characteristics of packets and drop it but what have I 
> gained?  I'm I trying to keep someone from tying up all my SMTP 
> connections?  Why would anyone bother to try and do that with Telnet? 
> There are lot more efficient tools available.  Unless you set up your SMTP 
> to only accept connections from known mail relays,  your have to accept 
> the fact that people can Telnet to your SMTP port.  I see little point in 
> trying to prevent it.
> 
> IMHO any ernest effort to prevent Telnet connection to an STMP port would 
> limit more legitimate connections then it would Telnet connections. 

Well, good point, the point of the thread and the question really results
to the following:  One must configure their SMTP server to the best of
their ability and then have another party check it for vulnerabilities and
tuning possibilities.  Tweaking in other words.  

I am sure their are several SendMail gurus out there.. :)



> 
> Bill Stackpole, CISSP
> 
> 
> 
> 
> 
> [EMAIL PROTECTED]
> 08/23/00 03:56 PM
> 
>  
>         To:     Douglas J Cameron <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
>         cc:     [EMAIL PROTECTED], [EMAIL PROTECTED]
>         Subject:        Re: SMTP servers
> 
> Absolutely correct, but Bill pointed out that he doesn't really care about 
> 
> SMTP abuse, but in reality one really does care, but I think the point 
> Bill 
> was trying to point was that it is very hard to separate out possible SMTP 
> 
> malformed connections versus normal connections on a very busy site, and 
> it 
> is quite possible that it may not be worth spending the money when the 
> real 
> problem is somewhere else on the network..
> 
> Also, I could be completely off and have no idea what point Bill is trying 
> 
> to emphasize.. :)
> 
> cheers
> 
> /m
> 
> At 05:12 PM 8/23/00 -0500, Douglas J Cameron wrote:
> >Ahem..
> >
> >Forgive me for breaking into the topic here and possibly arriving from
> >left field, but:
> >
> >Table 4.1 of "Internet Firewalls and Network Security" (Sijan/Hare, 1995)
> >shows this:
> >Port Number             Description
> >23                      Telnet
> >25                      SMTP(mail)
> >
> >So, why would you not simply use the sepaerate port numbers for the
> >seperate applications; and why would a firewall not know the difference
> >between these ports?
> >(Please forgive this newbie, O Great Firewall Wizards)
> >
> >Am I missing a huge foundation of knowledge here?
> >
> >On Wed, 23 Aug 2000 22:47:01 +0200 mouss <[EMAIL PROTECTED]> writes:
> > > There is nothing that a firewall can use to distinguish a
> > > "normal"client
> > > from a guy who telnet to the
> > > port, for the simple reason that both are exactly the same thing.
> > >
> > > an smtp connection consists of a client connectiing to port 25 of a
> > > host
> > > sending commands and
> > > reading responses. This client may be anything that is capable of
> > > handling
> > > a TCP connection.
> > > The telnet program may be used for this.
> > >
> > > so a firewall that rejects an SMTP connection just because it thinks
> > > it is
> > > coming from a "user doing
> > > telnet" is not only stupid, but it is not serving SMTP. relying on
> > > headers
> > > is not only useless, it is a
> > > loss of developpers energy, of the host CPU and yet another source
> > > of bugs.
> > >
> > > The problem of forged SMTP connections is the same as that of forged
> > >
> > > letters. the only way to guard against
> > > is to add a verification process which makes it harder to
> > > communicate by
> > > email. you can use encryption to make
> > > sure who sent what, but only if you know who can send you mail. if
> > > you
> > > accept to receive email from anybody,
> > > then that's it, you choosed to get served, accept the risks....
> > >
> > >
> > > mouss
> > >
> > >
> > > At 10:43 23/08/00 -0700, [EMAIL PROTECTED] wrote:
> > >
> > > >The characteristics of a Telnet connection are significantly
> > > different
> > > >from a standard SMTP connection and some firewall proxies can
> > > recognize
> > > >and drop Telnet connections but what's the point?   It's trivial to
> > > create
> > > >an interactive SMTP emulation that would bypass this check.  The
> > > port is
> > > >designed to for TCP connections that passes ASCII text characters.
> > > What
> > > >would you be accomplishing by preventing/dropping Telnet
> > > connections?
> > >
> > > -
> > > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > > "unsubscribe firewalls" in the body of the message.]
> >
> >________________________________________________________________
> >YOU'RE PAYING TOO MUCH FOR THE INTERNET!
> >Juno now offers FREE Internet Access!
> >Try it today - there's no risk!  For your FREE software, visit:
> >http://dl.www.juno.com/get/tagj.
> >-
> >[To unsubscribe, send mail to [EMAIL PROTECTED] with
> >"unsubscribe firewalls" in the body of the message.]
> 
> 
> 
> 

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to