XWall for Microsoft Exchange

XWall is a firewall that protects your Exchange server from viruses, spam mail and dangerous attachments.

Works with:

  • Every version of Exchange server including 
    Small Business Server 4.x
    and Exchange 2000
  • Dial-up, dial-up routers, ADSL and leased-line connections to the Internet
  • MIME and UUENCODE messages, even with various Western and Eastern European languages

Benefits:

  • Blocks SPAM messages by checking incoming messages against MAPS or any other RBL / SLS / SPAM database
  • Filters SPAM messages using a statistical approach with the Bayesian filter or by scanning the message for words
  • Validates the senders domain and does not accept message from invalid domains
  • Scans inbound and outbound messages for viruses, even when the filename includes characters from foreign languages
  • Blocks attachments so that your users do not fill the Exchange server with unnecessary or dangerous files
  • Blocks attachments embedded in TNEF messages ( WINMAIL.DAT )
  • Removes HTML and/or TNEF formatting from a message
  • Detects looping messages before they harm your server
  • Runs as a service on NT or Windows 2000
  • Compresses messages when sending to reduce bandwidth 
    (25% for zip files, 50% on average, 80% for WinWord and Excel)
  • Interfaces with MRTG to generate real-time statistics
  • Encrypts messages using SSL / TLS when sending
  • Reassembles messages to prevent from "hidden" attachments
  • Adds a disclaimer to every outgoing message

Optional:

  • Schedule ETRN, even when not using a dial-up connection
  • Keeps a copy of every incoming and outgoing messages so that you can track each message
  • Writes a statistics file to give you an overview of your traffic 
  • Forwards messages to one or more alternate e-mail address
  • Forwards a whole domain to a single e-mail address
  • Forwards a whole domain to another domain
  • Utilizes static routes for specific mail servers (acts as a relay in a firewall DMZ)
  • Works with POPBeamer in a POP3 enviroment

How It Works

For incoming messages, XWall needs to get the message before your Exchange server will get it so that it can perform it checks before passing the message over to Exchange. Depending on whether you run XWall on the same machine as Exchange or on a different machine, XWall either needs to hook up to port 25 or to act as a relay host (respectively).

For outgoing messages, Exchange server passes the message to XWall, which performs its checks and then sends the message out in the Internet. From Exchange Servers viewpoint, XWall is a normal relay host.

So the message flow for incoming messages would be Internet -> XWall -> Exchange server, and for outgoing messages it would be Exchange server -> XWall -> Internet


System Requirements

  • Windows NT, Windows 2000 with TCP/IP installed
  • Microsoft Exchange, Lotus Notes or any other SMTP server

Installation

  • Run Setup.exe or create a directory on your machine and 
    copy all the files into this directory.
  • Start MBAdmin.exe to configure XWall.
  • The first time you run XWall you will be prompted for the following information:

    Postmaster's address
    The address of the person who is responsible for maintaining XWall. 
    XWall will send all error messages to this address.

    The name or IP address of the Exchange server.
    If XWall is running on the same machine as the Exchange server than you can ( and should ) use localhost as the name.

    The port Exchange listens
    If XWall is running on the same machine as the Exchange server than use port 24, 
    else use port 25.

    The e-mail domain that your Exchange is responsible
    XWall needs to know for which e-mail domain your Exchange is responsible,
    so that if can forward messages for this domain to your Exchange.

  • Running XWall on the same machine as Exchange server

    Incoming Messages

    If you run XWall on the same machine as the Exchange, then you must tell Exchange to listen on a separate port; i.e. not port 25, because only one application can listen to a specific port at one time and XWall needs to be the first application that gets SMTP messages.

    • Exchange 5.x
      To do this open the file services, usually located in C:\WINNT\system32\drivers\etc\SERVICES with Notepad or any other text editor. Locate the line smtp 25/tcp mail and change 25 to the port of your choice (use 24 if you are not sure which one you should use) and save the file.

      Restart the IMS (Internet Mail Service) of the Exchange server to bring the new settings into affect.

    • Exchange 2000
      Start System Manager (Exchange Admin) and select  Servers->Your Server->Protocol->SMTP->Default SMTP Virtual Server->Properties. In this dialog select the tab labeled General and then Advanced and here you can set the port on which this virtual server listens.

      Also make sure Anonymous access is allowed or else XWall is not able to connect to Exchange. In System Manager ( Exchange Admin) select Servers->Your Server->Protocol->SMTP->Default SMTP Virtual Server->Properties. In this dialog select the tab labeled Access and then Authentication and enable Anonymous access.

    Then start MBAdmin, select View->Options->IP Address->Exchange SMTP Port and type in the same port that you used in services .


    Outgoing Messages

    • Exchange 5.x
    • Start Exchange Administrator, select the IMS (Internet Mail Service) and click on the tab labeled Connections.
      Enable Forward all messages to host and type in localhost. 
      Close the dialog and restart the IMS.
      From then on the Exchange server will forward all messages to the localhost, which basically means it sends them to XWall.

    • Exchange 2000
    • If you have no SMTP connector then start System Manager (Exchange Admin) and select  Servers->Your Server->Protocol->SMTP->Default SMTP Virtual Server->Properties. 
      In this dialog select the tab labeled Delivery and then Advanced.  
      In Smart host type in localhost. 
      Close the dialog and restart Exchange. From then on the Exchange server will forward all messages to the localhost, which basically means it sends them to XWall.

      If you have a SMTP connector then start System Manager (Exchange Admin) and select Connectors->Your SMTP Connector->Properties->Forward all mail through this connector to the following smart host and type in the name or IP address of the machine where XWall is running. 
      Close the dialog and restart Exchange. From then on the Exchange server will forward all messages to the name or IP address , which basically means it sends them to XWall.

  • Running XWall on a different machine then the Exchange server

    Incoming Messages

    Start MBAdmin, select View->Options->Exchange->Name or IP address of the Exchange server and type in the name or IP address of the Exchange server.

    Depending on your DNS configuration you will need to change the MX record so that it points to the machine where XWall is running or else XWall will not get the messages before Exchange. 


    Outgoing Messages

    • Exchange 5.x

      Start Exchange Administrator, select the IMS (Internet Mail Service) and click on the tab labeled Connections
      Enable Forward all messages to host and type in the name or IP address of the machine where XWall is running. 
      Close the dialog and restart the IMS. From then on the Exchange server will forward all messages to XWall.

    • Exchange 2000

      If you have no SMTP connector start System Manager ( Exchange Admin) and select  Servers->Your Server->Protocol->SMTP->Default SMTP Virtual Server->Properties. In this dialog select the tab labeled Delivery and then Advanced. In Smart host type in the name or IP address of the machine where XWall is running. Close the dialog and restart Exchange. From then on the Exchange server will forward all messages to XWall.

      If you have a SMTP connector then start System Manager (Exchange Admin) and select Connectors->Your SMTP Connector->Properties->Forward all mail through this connector to the following smart host and type in the name or IP address of the machine where XWall is running. 
      Close the dialog and restart Exchange. From then on the Exchange server will forward all messages to the name or IP address , which basically means it sends them to XWall.

Once you have done this you can start MBServer and check if all messages are properly routed.


Run XWall as a service

Keep in mind that XWall needs to reside on a local disk or the service controller will not be able to start it. For the examples below, we assume XWall is in C:\XWall

Once you run XWall as a service, errors will only be visible in the logfile. Consequently, before running it as a service you must first ensure that XWall is running properly with no errors by launching it in Console Mode (i.e. starting it from an icon).

In general, installing XWall as a service should be your last task and not your first.

  • Installing XWall as a service
  • Start MBServer.exe with the argument of install, by typing MBServer install at the command prompt and XWall will create the service.

    By default it is an AutoStart service and any time your computer is started, XWall will start. You can start and stop XWall at any time via Control Panel

    Note: After you have started XWall as a service, verify that XWall has no errors. 
    You need to take a look into the logfile to do this.

  • Removing XWall as a service
  • Start MBServer.exe with the argument of remove, by typing MBServer remove at the command prompt and XWall will delete the service.


How to stop XWall

  • XWall runs as a console application:
  • Press ESCAPE
  • Select Close from the system menu (works only on NT)
  • Press Alt-F4 (works only on NT)
  • XWall runs as a service on NT:
  • Open Control Panel, select Services, 
    locate XWall and press the button labeled Stop
  • type Net Stop XWall at the command prompt

Upgrade to the Latest Version

You will find the latest version of XWall at our Download Area.

Simply stop XWall and then run setup.exe to install the new version.


Tighten Security


To tighten your email security as much as possible enable the following setting:

 


Fight Spam

There are two ways to fight against spam and both have advantages and disadvantages:

  • Block all messages as early as possible

The advantage is that the messages do not reach your server and are blocked as early as possible, most of them at the SMTP protocol level. The drawback is that the administrator needs to handle all the exceptions.

For example, if you enable the Spam Lookup Service  (SLS) and you tell XWall to block all messages that are on the spamcop.net list, then this will catch a lot of spam mails ( usually around 50% ).

However, your best customer/supplier/friend/relative will also be blocked because he/she is using a mail server which is on the list. So you need to exclude this mail server and you need to adjust it any time the IP address changes.

What makes the task really time consuming is the fact that the customer/supplier/friend/relative does not simply tell you that your server does not accept mail because it is on a spam list. They will call you and say something like 
I can not send to you and you have to figure out what the problem might be.

  • Let all messages come in and mark the subject

The advantage of this is that the administrator has absolute no work and it give the most flexibility, because XWall only marks the subject ( it adds a small text like [sls] at the end of the subject ).

The final recipient can then simply setup a rule in his/her email client that deletes all messages where the subject contains [sls]. He/she can maintain a local exception list and do not need to call the administrator for handling an exception. Another option would be to color code the message rather then deleting it.

In practice this this has been proven to be the best way to fight spam.

Methods for the fight:

One of the best methods, it catches around 50% of spam

Does not really help much, because spammer usually use valid domains.

Most spam messages are sent as BCC and so this is a very effective way to fight against spam. Combined with a Spam Lookup Service it should catch around 95%. 

However, the drawback is that an extensive exclusion list is needs, because not every BCC is a spam.  Because of this there is no way to block BCC message in XWall.

Works far better that simply blocking words, 
because it is fully dynamic and there is no need to maintain a word list.

Keep in mind that XWall scan for strings and not words.
To scan for words you need to add a space in front and at the end of the string.

If the string is cum ( without the spaces that make it a word), then you block the authors name which is Michael Kocum. Or if the string is sex then this would also block MSExchange.

This is cpu intensive task, because the text needs to be normalized before it is scanned and this requires cpu power ( memory is not a issue )



Helper Programs

  • Signal
  • Signal is a command line program that allows you to perform the same commands as from the Signal menu of MBAdmin. You can force the download of POP3 messages by simply clicking on a link rather than starting MBAdmin.
    Signal.zip can be downloaded from our Download Area.

  • LogView
  • LogView allowss you to view the logfile in real time from any machine on your network. This is especially useful if MBServer runs as a service.
    LogView.zip can be downloaded from our Download Area.


Common Problems - FAQ

Error: Unable to connect to host
Error: Timeout in reading data [9]
550 5.7.1 Unable to relay for user@yourdomain.com
505 5.7.1: Client was not authenticated
XWall is running as a console application without any problems, but when running as a service errors are reported
XWall as a console application and the last screen line is not visible
XWall reports RAS problems when the Proxy server opens the line
You have a AVM card
Error: No Exchange server found at localhost
Files stuck in the MSG-IN directory
Error: No AUTH command in EHLO found, Authentication failed

 

KBXW001

  • Symptoms:
    The logfile shows Error: Unable to connect to host
  • Cause:
    Exchange does not listen for incoming messages on port 25. You can check if Exchange is listening on port 25 by typing (in a DOS box) telnet localhost 25 [enter]. When everything is working you should get back a greeting line, else you get a connection error.
  • Solution:
    Exchange 5.x
    Make sure that your Exchange server has Inbound SMTP enabled. In Exchange Admin select the Internet Mail Service (IMS) , select the tab Connections and make sure Inbound & Outbound is checked in the section Transfer Mode.

    Exchange 2000
    Make sure the Virtual SMTP Server is listening on port 25. Start System Manager (Exchange Admin) and select Servers->Your Server->Protocol->SMTP->Default SMTP Virtual Server->Properties. In this dialog select the tab labeled General and then Advanced and here you can set the port on which this virtual server listens.


KBXW016

  • Symptoms:
    The messages are not forwarded to the Exchange server; 
    the messages are all in the MSG-OUT directory and the logfile shows 
    Error: Timeout in reading data [9]
  • Cause:
    This error happens in Exchange 2000 when there is something that prevents Exchange from accepting the message. Usually the error is the result of a routing problem, a renamed domain in the recipient policy, an authentication problem or a firewall that blocks or a virus scanner that prevents Exchange from working correctly.
  • Solution:
    Exchange 2000

    Check if there is virus scanner running and disable it.

    or

    Check if there is a firewall like ISA Server that blocks the data flow between the interface that XWall uses and the interface that Exchange is bound.

    or

    Start MBAdmin, select View->Options->Exchange and change the name of the Exchange server from localhost to the name or IP address. If you are currently using a IP address or a name , then change it to localhost. The best is you try every combination and most likely one will work.

    or

    Start System Manager (Exchange Admin) and select Recipient->Recipient Policies.
    Make sure you have not renamed the domain in the Default Policy.  Adding a new domain is no problem, but renaming the default domain is not what Exchange likes.

    or

    Start System Manager (Exchange Admin) and select Servers->Your Server->Protocol->SMTP->Default SMTP Virtual Server->Properties. 
    In this dialog select the tab labeled Access and then Authentication and make sure Anonymous access or Basic Authentication is checked.


KBXW011

  • Symptoms:
    The logfile shows Error: No Exchange server found at localhost
  • Cause:
    A SMTP server is responding, but it is not the one of Exchange.

    The most common problems are:

    • The SMTP server of the IIS ( Internet Information Server ) is running
    • A proxy server with a virtual port mapping is active
    • The IP address you specified is wrong
  • Solution:
    In a DOS box type telnet localhost 25 [enter]. You will then get a greeting line of the SMTP server which should give you an idea what program is running.

    Exchange 5.x
    If the line reads something like 
    220 yourserver.yourdomain.com.com Microsoft ESMTP MAIL Service, Version: 5.0.2195.1600 ready
    rather than
    220 yourserver.yourdomain.com.com ESMTP Server (Microsoft Exchange Internet Mail Service 5.5.2653.13) ready
    then the SMTP server of the IIS ( Internet Information Server ) is running.

    In Control Panel->Services look for a service called Simple Mail Transport Protocol (SMTP) and stop it and disable it. Then restart the Exchange IMS and it should work.


KBXW002

  • Cause:
    This error happens in Exchange 2000 when the Exchange does feels responsible for your email domain. Usually this results because was installed using a different domain than your email domain and so you need to manually tell Exchange for which domain it is responsible.
  • Solution:
    Exchange 2000
    Start System Manager (Exchange Admin) and select Recipient->Recipient Policies.
    Then either change the Default Policy or create a new policy and tell Exchange for which domain it should accept mail.

    Additional info from Microsoft at Q289833


KBXW003

  • Symptoms:
    The logfile shows 505 5.7.1 Client was not authenticated
  • Cause:
    Exchange 2000 does not allow Anonymous access and so XWall is not able to connect to Exchange.
  • Solution:
    Exchange 2000
    In Exchange Admin select Servers->Your Server->Protocol->SMTP->Default SMTP Virtual Server->Properties. In this dialog select the tab labeled Access and then Authentication and enable Anonymous access.

    or

    Start MBAdmin, select View->Options->Exchange and check Exchange needs authentication and type in the user account and password XWall should use when connection to Exchange


KBXW004

  • Symptoms:
    The logfile shows Error: No AUTH command in EHLO found, Authentication failed
  • Cause:
    Authentication is enabled in XWall, but yout Exchange does not support authentication.
  • Solution:
    Start MBAdmin, select View->Options->Exchange and uncheck Exchange needs authentication

KBXW013

  • Symptoms:
    XWall download the messages without any problem but the files stuck in the MSG-IN directory and XWall does not send them to Exchange.
  • Cause:
    There is an on-access virus scanner running that blocks XWall from accessing the downloaded files.
  • Solution:
    In your on-access scanner disable the scanning of the XWall directory and below.

    Most scanners will never find a virus that is in a raw message file, because they can not extract the attachments from the message and even if they would find anything, they would confuse XWall more than it would help.

    If you enable the virus scanner support in XWall, it will extract the attachments and html pages from the message and call the scanner to scan it.


KBXW014

  • Symptoms:
    The logfile shows Error: No AUTH command in EHLO found, Authentication failed
  • Cause:
    Authentication is enabled in XWall, but yout Exchange does not support authentication.
  • Solution:
    Start MBAdmin, select View->Options->Exchange and uncheck Exchange needs authentication>

KBXW007

  • Symptoms:
    XWall is running as a console application without any problems, but when running as a service errors are reported.
  • Cause:
    The account you use to start the service does not have enough rights to use RAS or the Internet or the Proxy.
  • Solution:
    Start the service with Administrator or the account you use to logon onto NT and then it should work.

KBXW008

  • Symptoms:
    You have Windows 2000 and when running XWall as a console application the last screen line is not visible.
  • Cause:
    By default the Windows 2000 screen buffer size height for a console application is set to 300 lines.
  • Solution:
    Select the Properties of the console and then select the tab labeled Layout and change the Screen Buffer Size Height to 25

KBXW009

  • Symptoms:
    XWall reports RAS problems when the Proxy server opens the line.
  • Cause:
    You should run XWall over the proxy rather that use the built in dial-up.

KBXW010

  • Symptoms:
    You have a AVM Fritz! or B1 ISDN card and 
    • XWall reports: RAS port is not available
    • XWall reports: Another application is using the port  
    • NT server hangs after dialing
  • Cause:
    This is a problem of the driver for the FRITZ! or B1 card 
    (most likely its the AVM NDIS WAN v1.0)
  • Solution:
    You need to completely de-install the driver and RAS ( including all registry entries with Clearreg and Cearsys from AVM) and re-install the latest driver. This usually fixes the problem.

    You should run XWall over the proxy rather that use the built in dial-up.
    Information on how to configure your proxy can be found at 
    Additional information for Using a Proxy server

Licensing Agreement

XWall ⌐ is copyrighted 1993-2002 by DataEnter, Michael Kocum

This product and its documentation may not, in whole or in part, be copied, reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any other natural or computer language, in any form or by any means whatsoever, be it electronic, mechanical, magnetic, optical, manual or otherwise, without the prior written consent of DataEnter. DataEnter makes no warranty or representation, either expressed or implied, with respect to the product XWall and its documentation, their quality, performance, merchantability, or fitness for a particular purpose. DataEnter reserves the right to revise the user's guide and make changes to the content without obligation to notify any person or organization of such change. In no event will DataEnter be liable for any direct, indirect, special, incidental or consequential damages, real or imagined, resulting from the use or purchase of this software. Under no circumstances shall DataEnter's liability for damages exceed the price paid for the software license. Should any remedy hereunder be determined to have failed, all limitations of liability and exclusion of damages set forth above shall remain in full force and effect. The extent of the DataEnter's warranty for the software and its documentation is limited to physical defects of the distribution media containing the software. Contact DataEnter to obtain return authorization for the replacement diskette within 30 days of the original date of purchase. Any further statement made by agents, employees, distributors or dealers of DataEnter do not constitute warranties and are not binding. No employee of DataEnter has the authority to modify any portion of this warranty. All brand and product names we refer to in the documentation are used solely for identification purposes and may be trademarks of other companies.

DataEnter, (the licensor) grants the buyer (the licensee) the right to use this copy of XWall (the program) on a single computer at a single location servicing a single Exchange server as long as the licensee complies with the terms of this license. The licensor reserves the right to terminate this license if the licensee violates any part of the agreement. The licensee agrees to make copies of the program only for backup purposes. The licensee agrees not to copy the documentation and to take all necessary precautions to ensure that the backup copies of the software are not distributed to or acquired by other parties.

Microsoft Exchange, Windows 95, Windows NT and Windows 98 are a trademarks of Microsoft Corp.


History

  • v3.01 1998-08-06
    Released
  • v3.02 1999-09-27
    Fixed quoting in CSV file
    Added optional removing of Return-Receipt-To: for inbound and outbound messages
    Added dialup, SOCKS, ETRN and relaying
    Added address translation to translate e-mail domains, mailboxes or a complete domain to one single address
  • v3.03 1999-12-02
    Removed Norton Anti Virus from the supported scanner options, because it does not return a proper errorlevel in the newest versions
    Added support to limit concurrent connections
    Added user defined message size limit
    Added message compression when sending to another XWall (30 - 80% depending of the attachments in the message)
  • v3.05 2000-02-25
    Added support for forwarding to a group of addresses and for recursive forwards
    Fixed console screen when running as a interactive service
    Added workaround for Win2000 which reports an error when shutting down the service
  • v3.06 2000-04-27
    Fixed name server Auto Detect in Win2000
  • v3.07 2000-05-08
    Added blocking of a message by subject to block viruses like "ILOVEYOU"
    Added blocking of an outbound message by attachment name
    Added From: address to DNS messages
  • v3.08 2000-07-18
    Added the option to send a NDR when blocking an inbound attachment or subject
    Added the option to check for a blocked subject case sensitive and case insensitive
    Added support for CHUNKING (RFC 1830) for better sending to an Exchange 2000
    Added authentication for secure sending to an Exchange 2000
    Added complete support for RFC 1891 ( Delivers Status Notification)
    Added signal to send the current logfile to postmaster
    Added option to purge old logfiles
    Updated option to remove return-receipt for the new Exchange 2000 read receipt
  • v3.09 2000-09-11
    Fixed handling of a message with contains hundreds of sub messages
    Added option to also deliver to the orignal e-mail address after forwarding
    Added a workaround for servers that deny the RSET command
    Added support for F-PROT 3.x anti-virus scanner
    Added support for blocking a normalized subject
    Added blocking of a message by message text
    Added option to define static routes for specific e-mail domains
  • v3.10 2000-10-27
    Fixed handling of yahoo multipart messages where a blank line is missing
    Added a switch to allow relaying for client from an internal IP address
    Added support for command pipelining (RFC1854)
    Added support for message chunking (RFC1830)
    Added support for virus scanning of html pages
    Fixed relaying for domains with a static route when a smart host was specified
  • v3.11 2000-12-21
    Fixed virus scanning with the newer versions of F-PROT
    Added support for blocking based on ORBS spam list
  • v3.12 2001-02-10
    Added support for RFC 2554 ( SMTP AUTH LOGIN )
    Added support for RFC 2595 ( SMTP AUTH PLAIN )
    Added support for RFC 2195 ( SMTP AUTH CRAM-MD5 )
    Added support for SMTP AUTH NTLM
    Changed the default SMTP connection limit to 100 concurrent connections
  • v3.13 2001-04-11
    Changed the logfile to use UTF-8 rather than ASCII
    Changed the .dat and .ini files to use ANSI and UTF-8 rather than ASCII
    Changed the orbs blocking to use the new outputs.orbs.org
    Changed the maps blocking to use the new dialups.mail-abuse.org and blackholes.mail-abuse.org
    Changed the blocking of the subject to scan for strings rather than comparing from left to right
    Changed the default action for a blocked inbound attachment to "discard"
    Fixed the DNS query for the MX record to stop after the first server in the case a domain has no MX
    Fixed the DNS query for the MX record to query for an A record even one of the DSN servers is down
    Added support for messages encoded in UTF-7 and UTF-8
    Added blocking based on string in the html part of a message
    Added support for KOI8-R ( Russian ) and Big5 ( Chinese ) message decoding
    Added support for code page 1255 ( Hebrew ) message decoding
  • v3.14 2001-05-04
    Fixed detection of Magistr virus
    Changed the parsing of the header of a message to accept only a blank line with CRLF as end-of-header
    Added the option to scan embedded TNEF ( WINMAIL.DAT ) for viruses
  • v3.15 2001-06-07
    Fixed decoding of messages with more than 40000 Content-Type definitions
    Fixed console screen buffer handling when running on Windows 2000
    Changed that no error is generated when the Exchange does not allow authentication
    Added a check for an on-access virus scanner, because the scanner will block XWall from accessing its files
    Added additional checking when reading queued messages from disk
    Added checking of the senders domain as an optional spam check
  • v3.16 2001-08-10
    Fixed SMTP authentication with servers that announce only AUTH and PLAIN
    Fixed a problem decoding the attachments of a multipart/related message
    Fixed a bug when an out-of-range SMTP DATA command crashes XWall
    Changed the default charset for non-deliver-messages from ISO-8859-1 to UTF-7
    Removed support for the ORBS spam list, because the list is no longer working
    Combined MAPS RBL, DUL and RSS into one lookup
    Added inbound and outbound SMTP authentication
    Added inbound SMTP authentication using NTLM
    Added an option to relay messages for authenticated users ( allow XWall to act as a relay for POP3 clients )
    Added infinite message loop detection
    Added the option to manually define spam dns lookup services
    Added the option to show real time statistic using MRTG (Multi Router Traffic Grapher)
    Added "mark subject" as an action when a message is blocked
    Added the option to automatically BCC every message to a specific e-mail address
    Added the option to CC every blocked message to a specific e-mail address
  • v3.17 2001-10-18
    Fixed setting of the expiration time of a message when XWall restarts
    Fixed the decoding so that it does not take forever to normalize a message with a very large body text
    Changed definition of MAPS, because MAPS is now a pay service
    Added user defined Spam Lookup Services
    Added support for Sophos Anti-Virus 3.x
  • v3.18 2001-11-29
    Fixed detection of Aliz virus
    Added the option to perform an online check for a new program version
    Added the option to notify the postmaster in the case a new program version is available
    Added the option to exclude email addresses from html/text/subject blocking
    Added the option to exclude IP addresses from SLS/MAPS blocking
    Added the option to remove the HTML part of a message
  • v3.19 2002-02-27
    Fixed the announcement of authentication in inbound ESMTP
    Fixed the multiply host name announcement in ETRN
    Fixed html remove with signed messages
    Fixed auto detect of dns server when running under a user account
    Added diagnostic logging for the virus scanner
    Added a more verbose logging when blocking a message
    Added support for RFC 2480
    Added more verbose logging when blocking an IP address by using SLS
    Added support for virus scanning in the EML message format
    Added support for blocking files with a CLSID extension
    Added support for SSL / TLS encryption
  • v3.20 2002-05-03
    Fixed blocking of attachments with an extension of .eml
    Fixed HELO when ESMTP is disabled
    Fixed html remove so that it works better with Exchange 5.x
    Fixed deleting of the xxxx.tmp files after a invalid BDAT transfer
    Changed the removing of the HTML formatting; making it more human readable
    Added the option to mark the subject for BCC messages
    Added the option to block e-mail addresses
    Added the option to exclude e-mail addresses from blocking
    Added the option to reassemble the messages for 
    protection against badly formatted messages and viruses
    Added the option to block files with a dot as the last char ( file.vbs. )
    Added the option to add a disclaimer to outgoing messages
    Added the option to remove the TNEF part of a message
    Added a check for an on-access virus scanner at startup
  • v3.21 2002-05-30
    Fixed html parser for <style> tag
    Fixed decoding of utf-7 messages
    Fixed a bug when a disclaimer with no blank line at the 
    beginning was added to a empty note text
    Fixed a extra char problem when adding a disclaimer to a hmtl message
    Fixed a special html char problem when adding a disclaimer to a hmtl message
    Changed the handling of a SSL/TLS connection when the target host 
    has not CN (common name)
    Added support for nested digest messages
    Added a statistic file for spam blocking and virus
  • v3.22 2002-08-09
    Fixed domain validating when a relay host is defined
    Fixed adding a disclaimer to a message/report
    Fixed a timeout problem with SSL/TLS
    Fixed decoding of an Unicode tnef attachment name
    Changed the handling of a SSL/TLS connection when the target host has no CN
     (common name)
    Added a check at startup to make sure the SLS (Spam Lookup Services) are responding 
    ( to prevent timeouts when queries a not working SLS )
    Added the option to mark the subject for faked From: addresses
    Added the option check the IP of the message header against SLS/MAPS
    Added the IP address to the message that will be shown to the 
    sending server when blocked by MAPS/SLS
    Added the option to define the temp path without changing the TEMP environment variable
  • v3.23 2002-10-16
    Fix: Encoding of foreign display name when body text is plain ASCII
    Fix: HTML decoding is done before a check for a blocked string in the text
    Fix: In a non-delivery report the header and the body text was sent back 
    rather than only the header
    Fix: Contacted the authoritative name server of a domain even 
    when the local name server provided an authoritative answer
    Fix: Decoding of Big5 HTML messages
    Fix: Rotation of the logfile at midnight
    Chg: ESC value for blocked text and blocked html from 5.7.0 to 5.9.7
    New: Block a sending host with an invalid FQDN 
    ( full qualified domain name ) in the HELO/EHLO
    New: Block a sending host if no reverse lookup of the IP address exist ( missing DNS PTR )
    New: Block all attachments
    New: Check of the name server at startup to make sure it is working
    New: Dump Mark Subject data to the logfile
    New: More actions when detecting a SLS/RBL/MAPS message
    New: More actions when text blocking a message
    New: The logfile and the NDR now shows the SLS service and
     the IP that blocked the message
    New: XWall writes the SLS/RBL/MAPS blocking database and the IP address 
    of the sending host to the header of the message so that this information 
    is quickly available in Outlook
    New: Block partial attachments (message/partial)
    New: Field in the statistic file to indicate spam mail
    New: Support for ISO-2022-JP (Japanese Characters)
    New: Wildcards can be used for blocking attachments, text, HTML and subject
    New: The logfile and the non-delivery-report now shows the line in 
    which a blocked string was found
    New: Logging to screen is disabled when XWall runs as a service
    New: Statistical approach with the Bayesian filter to filter out spam mails
  • v3.24 2002-12-04
    Fix: Typo in a delivery status notification
    Fix: Sometimes the non-delivery report for blocked subject/text/HTML 
    showed the wrong string
    Chg: XWall allows a CNAME as an MX records; 
    this is prohibited by RFC 1713 and 2181, but a lot of sites use it
    Chg: Renamed "message loop" to "suspicious message", 
    because it's not always a looping message
    New: XWall stops accepting messages when the disk has less then 20MB free space
    New: /PROGRAM as argument for McAfee scanner
    New: Verify FQDN only when the user is not authenticated
    New: MRTG and statistic values for the count of blocked and spam messages
    New: statistic values for the format of a message (HTML,TNEF,DSN,SIGN,ENCRYPT)
    New: Exclusion by IP and e-mail address for SLS, Bayes, 
    dns verify, remove format and envelope
    New: XWall shows now the name of the virus as long as the scanner 
    is able to give back this information

How XWall works

Installation
System Requirements
Run as a service
How to stop XWall
Upgrade

Tighten Security
Fight Spam

Admin options
Helper Programs

FAQ
Bayes-FAQ

History
Licensing Agreement
Supported RFC