I haven't seen this with squid per se but I have seen
spam relays happen through Novell Bordermanager
utilizing SMTP traffic.  The administrator this was
affecting contacted me and I used packet filtering to
eliminate this possiblity.  I would advise a similar
method in this scenario.  Unless of course your are
running an unrestricted public proxy.  

                             Ryan Kather

--- Joe Cooper <[EMAIL PROTECTED]> wrote:
> If using a default Squid configuration file from a
> recent version, I 
> suspect you would be seeing DENIED rather than MISS
> here.
> 
> CONNECT should only be permitted on certain ports
> (by default this is 
> 443 and 563, I believe).
> 
> So, yes, it does appear someone could be hopping
> through your proxy to 
> mail relays.
> 
> Mark Constable wrote:
> 
> > My apologies for an off-topic message but I'm not
> connected to any other
> > Squid users forum and these log entries concern
> me. Is anyone aware of any
> > possiblity of using Squid on port 3128 to send UCB
> (spam email) to port 25 ?
> > 
> > 1015065329.553  75856 65.173.24.27 TCP_MISS/000 0
> CONNECT \
> >   relay1.exodus.net:25 - NONE/- -
> > 1015065329.553  34295 207.30.52.90 TCP_MISS/200
> 419 CONNECT \
> >  rly-yb02.mx.aol.com:25 - DIRECT/205.188.156.98 -
> > 1015065329.553  50101 66.74.64.133 TCP_MISS/000 0
> CONNECT \
> >  notessmtp2.ascap.com:25 - NONE/- -
> > 
> > I guess this could be on-topic as far as filtering
> goes !
> > 
> > --markc
> 
> -- 
> Joe Cooper <[EMAIL PROTECTED]>
> http://www.swelltech.com
> Web Caching Appliances and Support
> 


__________________________________________________
Do You Yahoo!?
Try FREE Yahoo! Mail - the world's greatest free email!
http://mail.yahoo.com/

Reply via email to