On 10/31/2011 8:12 PM, Brian Johnson wrote:

Sent from my iPad

On Oct 31, 2011, at 1:30 PM, "Jack Bates"<jba...@brightok.net>  wrote:


On 10/31/2011 11:48 AM, Michael Thomas wrote:
I've often wondered the same thing as to what the resistance is to outbound
filtering is. I can think of a few possibilities:

1) cost of filtering
2) false positives
3) really _not_ wanting to know about abuse
On the other hand, you have

1) cost of tracking
2) support costs handling infections

It's really an range from "easiest and cost effective" to "doing it right". I 
personally run hybrid. There are areas that are near impossible to track; this is especially true 
for wide area wireless/cellular/NAT areas. I always recommend my customers block tcp/25, even to 
the local smarthosts. Use 587 and authentication to support better tracking. It's a hack, though, 
as it doesn't stop other abuses and it won't fix the underlying root cause.
Let me know when u can "fix" the root causes. The two I know of:
1. Bad actors
2. Clueless users

While true, from a security viewpoint, the root cause is loss of control over the system involved. Spam, while perhaps the most visible and annoying to others is not my highest concern (We find the number of clueless users direct spamming is miniscule compared to hijacked systems). My concern is that the customer has lost control of their machine and could at that moment be unknowingly giving out critical information.

-Jack

Reply via email to