<?xml version="1.0" encoding="utf-8" ?>
<?xml-stylesheet type="text/xsl" href="RSS_xslt_style.asp" version="1.0" ?>
<rss version="2.0" xmlns:WebWizForums="http://syndication.webwiz.co.uk/rss_namespace/">
 <channel>
  <title>Spam Filter ISP Forums : Firewall / IDS Pit Fall (False Triggers)</title>
  <link>https://www.logsat.com/spamfilter/forums/</link>
  <description><![CDATA[This is an XML content feed of; Spam Filter ISP Forums : Spam Filter ISP Support : Firewall / IDS Pit Fall (False Triggers)]]></description>
  <pubDate>Wed, 11 Mar 2026 15:06:30 +0000</pubDate>
  <lastBuildDate>Thu, 24 Jan 2008 13:27:23 +0000</lastBuildDate>
  <docs>http://blogs.law.harvard.edu/tech/rss</docs>
  <generator>Web Wiz Forums 11.04</generator>
  <ttl>360</ttl>
  <WebWizForums:feedURL>https://www.logsat.com/spamfilter/forums/RSS_post_feed.asp?TID=6365</WebWizForums:feedURL>
  <image>
   <title><![CDATA[Spam Filter ISP Forums]]></title>
   <url>https://www.logsat.com/spamfilter/forums/forum_images/web_wiz_forums.png</url>
   <link>https://www.logsat.com/spamfilter/forums/</link>
  </image>
  <item>
   <title><![CDATA[Firewall / IDS Pit Fall (False Triggers) :  There have been a couple of...]]></title>
   <link>https://www.logsat.com/spamfilter/forums/forum_posts.asp?TID=6365&amp;PID=11611&amp;title=firewall-ids-pit-fall-false-triggers#11611</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://www.logsat.com/spamfilter/forums/member_profile.asp?PF=22">Desperado</a><br /><strong>Subject:</strong> 6365<br /><strong>Posted:</strong> 24 January 2008 at 1:27pm<br /><br /><DIV><FONT face=Arial size=2><DIV><FONT face=Arial size=2>There have been a couple of reports of the LogSat web server "attacking" SpamFilter customers networks and even causing some firewalls to go into some ugly&nbsp;La-La land. This is not an "attack".&nbsp;However, the high traffic nature of email messaging (and SPAM!) can cause a tightly configured (Anal retentive?) IDS or Firewall to mistake it as such.</FONT></DIV><DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV><DIV><DIV><FONT face=Arial size=2>LogSat's web server is where your SpamFilter makes all the http requests to check if an IP is listed in the SFDB and SFDC. While your SpamFilter connects to port 80 on LogSat's webserver, the return traffic will occur, by the nature of TCP, on a different random port on your server.</FONT></DIV><DIV>&nbsp;</DIV><DIV><FONT face=Arial size=2>If an IDS is not able to "understand" the concept of established connections, it will not understand that the HTTP response, from LogSat's webserver to a random port on your server is, in fact, just that ... return HTTP traffic.</FONT></DIV><DIV>&nbsp;</DIV><DIV><FONT face=Arial size=2>One recommendation would be to check the documentation for ISA server or whatever firewall appliance you have to see if it can be configured to detect anomalies while ignoring established TCP connections, as in this latter case, the return traffic on the random, high port numbers is absolutely legitimate and should not be interpreted as an "attack".</FONT></DIV></DIV></FONT></DIV><span style="font-size:10px"><br /><br />Edited by Desperado - 24 January 2008 at 11:50pm</span>]]>
   </description>
   <pubDate>Thu, 24 Jan 2008 13:27:23 +0000</pubDate>
   <guid isPermaLink="true">https://www.logsat.com/spamfilter/forums/forum_posts.asp?TID=6365&amp;PID=11611&amp;title=firewall-ids-pit-fall-false-triggers#11611</guid>
  </item> 
 </channel>
</rss>