[120309] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Arrogant RBL list maintainers

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Wed Dec 16 02:31:28 2009

In-Reply-To: <6eb799ab0912152212l793f2fd7jeabfb841c7b3b72f@mail.gmail.com>
Date: Wed, 16 Dec 2009 13:00:42 +0530
From: Suresh Ramasubramanian <ops.lists@gmail.com>
To: James Hess <mysidia@gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Security by obscurity, in this day and age? :)

On Wed, Dec 16, 2009 at 11:42 AM, James Hess <mysidia@gmail.com> wrote:
> As is common for many domains.
> Spammers coming in =C2=A0by =C2=A0scanning =C2=A0large ranges of IPs, =C2=
=A0have no
> pointer to report =C2=A0the =C2=A0mailserver they discovered =C2=A0is =C2=
=A0@example.com
> =C2=A0inbound =C2=A0(or outbound) mail.
>
> Since the RDNS domain is different, and in fact generic, =C2=A0which =C2=
=A0helps
> avoid =C2=A0assisting the spammer =C2=A0in identifying the IP as an =C2=
=A0inbound
> mail server.



--=20
Suresh Ramasubramanian (ops.lists@gmail.com)


home help back first fref pref prev next nref lref last post