[112955] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: REVERSE DNS Practices.

daemon@ATHENA.MIT.EDU (Tom Wright)
Thu Mar 26 21:12:15 2009

From: Tom Wright <twright@internode.com.au>
To: Steven Champeon <schampeo@hesketh.com>
In-Reply-To: <20090326165658.GA23335@hesketh.com>
Date: Fri, 27 Mar 2009 11:39:49 +1030
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 27/03/2009, at 3:26 AM, Steven Champeon wrote:
> Especially if they're spewing spam and viruses like a firehose.

If you're talking about our net blocks, then
please do drop me a line.  We're quite serious
about minimising the spam sent from our network,
and we'd be happy to investigate.

> Unfortunately, it's not. Even more unfortunately, we see more junk
> from their generic statics than we do from their obvious dynamics.

That seems about right.  We filter port 25 outbound from
our dynamic ranges (by default).
http://www.internode.on.net/support/faq/email/port_filtering/


-- 
Kind Regards,

Tom Wright
Internode Network Operations
P: +61 8 8228 2999
W: http://www.internode.on.net



home help back first fref pref prev next nref lref last post