[29860] in North American Network Operators' Group
Re: RBL-type BGP service for known rogue networks?
daemon@ATHENA.MIT.EDU (Peter van Dijk)
Sat Jul 8 13:40:47 2000
Mail-Followup-To: nanog@merit.edu
Date: Sat, 8 Jul 2000 19:38:36 +0200
From: Peter van Dijk <petervd@vuurwerk.nl>
To: nanog@merit.edu
Message-ID: <20000708193836.A17057@vuurwerk.nl>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <200007081727.e68HRhX26071@hi.tech.org>; from stuart@mfnx.net on Sat, Jul 08, 2000 at 10:27:43AM -0700
Errors-To: owner-nanog-outgoing@merit.edu
On Sat, Jul 08, 2000 at 10:27:43AM -0700, Stephen Stuart wrote:
>
> > I see 2 possibilities:
> > - MAPS doesn't test if a reported spamhouse is really an open relay, and is
> > therefore susceptible to forgery.
> > - MAPS does do open relay testing and therefore performs the same
> > 'unsolicited traffic' as ORBS, which would mean they're hypocritic.
>
> testing != probing, so your list of possibilities is incomplete.
Standing slightly corrected by another post, it seems MAPS investigates
each report thoroughly.
I do not see how you would check if a machine is an open relay without
testing, tho.
Greetz, Peter.
--
petervd@vuurwerk.nl - Peter van Dijk [student:developer:ircoper]