Since when is Internet email reliable?
-----Original Message-----
From: J. Oquendo [mailto:sil@politrix.org]
Sent: Thu Aug 18 14:38:31 2005
To: nanog@nanog.org
Cc: William Allen Simpson
Subject: Re: Blocking certain terrorism/porn sites and DNS
On Thu, 18 Aug 2005, William Allen Simpson wrote:
> Apparently, you did.... Of course, repeated posting here will vastly
> improve your opportunity to examine binaries handily delivered directly
> to your own email box. ;-)
"handily delivered directly to your own email box." I take note of "your
own email box." So again I ask, how do you propose dealing with mail that
was "handily delivered" to your clients' email boxes. Or would you just be
assuming "if test -f LOOKS_LIKE_MY_EMAIL then filter_that".
Either way you want to cut your comment it would take a bit of snooping to
parse out traffic not destined to your own email box(es). So what do you
tell your customer "Oh by the way we had to snoop in on your sessions to
stop some new and improved MS uberworm." If so, when do you do it,
when your network is crawling, after the fact... What if you're off by one
and accidentally filter out say a contract worth a lot. Again, if I'm
missing something by all means e-smack me.
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
GPG Key ID 0x97B43D89
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x97B43D89
To conquer the enemy without resorting to war is the most
desirable. The highest form of generalship is to conquer
the enemy by strategy." - Sun Tzu