On Nov 27, 2016, at 16.15, li...@lazygranch.com wrote:
> 
> I hate to bug the list for what is probably a dumb question, but is there any 
> situation where an unauthorized user needs to connect to port 587? I'm 
> wondering if there is some oddball  "edge" case.

well, i suppose it would depend upon what your definition of "unauthorized" 
actually is, but making some assumptions, the short answer is likely no.  since 
you refer below to blocking troublemakers, presumably we're talking about the 
internet, rather than an internal or such network where there might be the 
occasional device which cannot perform smtp auth, encryption, etc., and for 
which an exception might be necessary [for those edge cases, i use 
check_client_access and a cidr map].

> My thought is to use my ipfw table of known trouble makers to block 587.

honestly, i'm not sure i'd bother.  it may be fine, but it's also one more 
thing to include risk for a false positive.

Reply via email to