Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Blocking certain terrorism/porn sites and DNS

  • From: J. Oquendo
  • Date: Thu Aug 18 14:38:02 2005


On Thu, 18 Aug 2005, William Allen Simpson wrote:

> Apparently, you did....  Of course, repeated posting here will vastly
> improve your opportunity to examine binaries handily delivered directly
> to your own email box.  ;-)

"handily delivered directly to your own email box." I take note of "your
own email box." So again I ask, how do you propose dealing with mail that
was "handily delivered" to your clients' email boxes. Or would you just be
assuming "if test -f LOOKS_LIKE_MY_EMAIL then filter_that".

Either way you want to cut your comment it would take a bit of snooping to
parse out traffic not destined to your own email box(es). So what do you
tell your customer "Oh by the way we had to snoop in on your sessions to
stop some new and improved MS uberworm." If so, when do you do it,
when your network is crawling, after the fact... What if you're off by one
and accidentally filter out say a contract worth a lot. Again, if I'm
missing something by all means e-smack me.

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
GPG Key ID 0x97B43D89
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x97B43D89

To conquer the enemy without resorting to war is the most
desirable.  The highest form of generalship is to conquer
the enemy by strategy." - Sun Tzu




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.