On Jun 14, 2006, at 1:53 PM, Church, Chuck wrote:
Since this technique requires a IPinIP or GRE tunnel, wouldn't
blocking
these two protocols to/from the hosts be sufficient? Assuming of
course
the customer's host isn't using that normally.
Unfortunately, that probably won't work for very long, if at all.
First, it's kinda difficult to guarantee your customers will not use
a protocol.
Second, unless you have deep packet inspection, what is to stop the
spammer from using, say, port 80 for their tunnel?
Third, what's to stop them from using SSH tunnels?
Etc., etc., etc....
--
TTFN,
patrick