vaida bogdan wrote:

A solution I was going to implement was mailsnarf on GW1 but it does
snat and mailsnarf still logs mails with the source ip of GW1. Any
ideeas on how to overcome this ? (I think a comparison between "logged
ip headers'" time and "virii found @ MAIL SERVER" time improper.)

iptables snat rule:
SNAT       all  --  intif/24      anywhere           to:extif

All right, this is more complicated than doing "netstat | grep smtp". You could try ClamSMTP as a transparent proxy to filter an entire network's SMTP traffic at the router (or gateway GW1).


  http://memberwebs.com/nielsen/software/clamsmtp/

The log from clamsmtpd will show the real address from where the viruses came. The deamon will clean those infected emails so the mail server will only see a connection initiated and then droped. As a side effect all uninfected messages will now also carry the real address where they come from.

I haven't used this "full transparent" proxy mode, but as "semi transparent" proxy clamsmtpd works very well.
--
René Berber


_______________________________________________
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users

Reply via email to