Post by Jan HoolwerfHello dIMITRI,
Post by dIMITRIPost by djfox741Dus het lijkt er aardig op dat er op uitgaande post word
gecontroleerd :-(
Dat klopt, maar waarom de :-( ?
Is dit ooit kenbaar gemaakt aan de klanten van Demon? Dat heb ik dan
gemist.
En heb ik het niet gemist maar is Demon hier onaangekondigd mee
begonnen dan vind ik dit vanuit pr standpunt een bijzonder domme zet.
Kan het niet positiever formuleren vrees ik.
Nogal wat mensen hebben bij een eerdere isp knap traumatische <g>
ervaringen opgedaan met stiekum, en daarmee bedoel ik niet
aangekondigde, uitgevoerde virusscans op mail. Vaak met zwarte gat
ervaringen e.d. en dan wordt je niet echt vrolijk als je merkt dat je
huidige isp dat ook doet.
I can't speak for what we have or haven't said about it. I can make
a few comments:
1) no-one is compelled to use post.demon.nl to send mail, although the
current trend with many ISPs is to only accept mail from servers
known to be ISP's smarthosts. This makes the use of ISP's
smarthosts semi-mandatory, whether one likes it or not. To try to
minimise the effect of blacklisting, preventing the sending of
viruses via post.demon.nl benefits most customers.
2) no anti-virus scanner is perfect and the test mail which started
this thread is an example of the limitations. Scanners use
signatures to recognise viruses - patterns of text which, when
seen, make the probability that the email in question is a virus
very high. The test mail contained one or more of the signature
strings used to recognise a particular virus.
3) We are currently running this on post.demon.nl for outbound
mail. The server will refuse to accept mail which triggers the
scanner. Any sensible mail client, and even some well known very
poor mail clients, will report delivery failures where the remote
SMTP server refuses to accept a mail. This is different than
accepting and silently discarding mail, it should never produce a
'black hole' effect.
4) We probably will start running the same anti-virus softwaare on our
incoming mail servers - there are some issues, including informing
customers, which we need to be sure we have correct before doing
so. But the costs to Demon and to our customers of the current
trend of viruses, many of which leave back-doors to allow remote
use of machines for spamming, make this almost inevitable.
Post by Jan HoolwerfAls de isp daarentegen vooraf duidelijk maakt wat ze doet, waarom ze
het doet, hoe ze het doet en wat de consequenties zijn dan zal de
meerderheid van de klanten het positief opvatten. Ik tenminste wel
want ik wordt regelmatig niet vrolijk van die virussen.
We currently run clam-av on all mail sent outwards via
post.demon.nl. Any mail seen as containing a virus is rejected during
the SMTP session where it first arrives at our servers, leaving the
sender to report the failure or generate a bounce message, as
appropriate. The scanner is continually updated, but we can never
guarantee that it will catch 100% of all virus mails. When we are
running it on incoming mail, I hope none of our customers decides to
save a small amount and discontinue running AV software on their own
system, as there are other ways to get viruses and there is no
guarantee that Demon will have eliminated every virus from your
incoming mail.
--
--
Jim Segrave ***@jes-2.demon.nl