On Mon, Mar 05, 2012 at 11:06:26AM -0600, I wrote:
> On Mon, Mar 05, 2012 at 11:21:30AM -0500, Rod Dorman wrote:
> > On Monday, March 5, 2012, 09:53:31, /dev/rob0 wrote:
> > >  ...
> > > Another WAG: maybe your ISP's upstream provider got tired of
> > > complaints and implemented this redirection upstream. This would 
> > > explain why the ISP would not know.
> > 
> > I would be horrified is this turned out to be the cause.
> > 
> > Without deep packet inspection there would be no way to
> > distinguish between SMTP packets originating from the ISP's
> > MTA vs. his MTA.
> 
> Sure there is: IP address. To expand on the previous example:

Oh, but I think I get Rod's point: this requires the upstream 
provider to know and make exception for the MTA's IP address; the 
aforementioned deep packet inspection being the only sure way to 
automate this.

And yes, surely someone at the ISP should have been aware of this.

> iptables -N SmtpRedirect
> iptables -A SmtpRedirect -p tcp -m multiport --dports 25,587 \
>     -j REDIRECT --to-ports 2525
> iptables -A FORWARD -s IPS.MTA.IP.addr -j ACCEPT
> iptables -A FORWARD <something to detect abuse> -j SmtpRedirect
> 
> Packets from that address would never enter the SmtpRedirect chain.
> 
> That said, there seems to be cause for horror in any case. One such 
> case which I have not yet addressed: the OP could indeed be an 
> abuser. But even that case is ISP fail, because limiting it is not 
> the solution; cutting it off entirely would be.
-- 
  http://rob0.nodns4.us/ -- system administration and consulting
  Offlist GMX mail is seen only if "/dev/rob0" is in the Subject:

Reply via email to