[29906] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (Shawn McMahon)
Sun Jul 9 15:51:16 2000

Date: Sun, 9 Jul 2000 15:45:27 -0400
From: Shawn McMahon <smcmahon@eiv.com>
To: North America Network Operators Group Mailing List <nanog@merit.edu>
Message-ID: <20000709154527.A21919@eiv.com>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
	protocol="application/pgp-signature"; boundary="EVF5PPMfhYS0aIcm"
Content-Disposition: inline
In-Reply-To: <20000709192944.C7C34E0@proven.weird.com>; from woods@weird.com on Sun, Jul 09, 2000 at 03:29:44PM -0400
Errors-To: owner-nanog-outgoing@merit.edu



--EVF5PPMfhYS0aIcm
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Sun, Jul 09, 2000 at 03:29:44PM -0400, Greg A. Woods wrote:
>=20
> As such I cannot condone allowing any open relay to function without
> question especially if it has not yet been exploited, because eventually
> it will be exploited (even if only to relay one single unwanted
> message).

Yes, but you're so paranoid that you don't accept email from boxes that HELO
themselves as a CNAME.


--EVF5PPMfhYS0aIcm
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5aNZWEcl9bQ0RMt0RAr1VAKCNpFzVJOSkOGVD1UahRVei3Ce7JwCgv4JO
FT4QIbpnkOBw+gHpta4V7Xo=
=nrB5
-----END PGP SIGNATURE-----

--EVF5PPMfhYS0aIcm--


home help back first fref pref prev next nref lref last post