From owner-freebsd-ports@FreeBSD.ORG Mon Sep 8 11:46:29 2008 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id D9721106564A for ; Mon, 8 Sep 2008 11:46:29 +0000 (UTC) (envelope-from david@vizion2000.net) Received: from dns1.vizion2000.net (77-99-36-42.cable.ubr04.chap.blueyonder.co.uk [77.99.36.42]) by mx1.freebsd.org (Postfix) with ESMTP id 9E7A78FC21 for ; Mon, 8 Sep 2008 11:46:29 +0000 (UTC) (envelope-from david@vizion2000.net) Received: by dns1.vizion2000.net (Postfix, from userid 1007) id 02A681CC32; Mon, 8 Sep 2008 05:10:28 -0700 (PDT) From: David Southwell Organization: Voice and Vision To: freebsd-ports@freebsd.org Date: Mon, 8 Sep 2008 05:10:27 -0700 User-Agent: KMail/1.9.10 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200809080510.27779.david@vizion2000.net> Subject: Mail services checking - URGENT X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 08 Sep 2008 11:46:29 -0000 Hi I have had a series of attacks on a system which resulted in a hijack of our mail system. I believe I have now fixed the main problem but I need a tool that will reliably, and independently of the mail logs check my network for all outgoing mails and hold them up until I am certain that there all loopholes have been closed. Can anyone please let me have some recomendations on the best way of going about this Thanks David