Jari Fredriksson wrote:
[EMAIL PROTECTED] wrote:
If port 25 were blocked from consumers and they were forced to talk to
servers on port 587, even without authentication, then a server could
distinguish consumers from other servers. I think this kind of
configuration could be used to help isolate virus infected computers
from spamming and spreading.

What would prevent virus infected computers from using the port 587 of that would be the common usage?


What would prevent it is that if you use separate servers or separate IP addresses for email that your are recieving from other servers than the ones that you use for outgoing customers then port 587 would be closed. 587 would only be open for customers (usually authenticated) on machine sending, not receiving email. Port 25 would become a server to server port and 587 would be a user to server port. Users would have port 25 blocked so they can't talk to the server to server traffic.

Reply via email to