[37818] in North American Network Operators' Group
Re: Stealth Blocking
daemon@ATHENA.MIT.EDU (Mitch Halmu)
Thu May 24 17:07:57 2001
Date: Thu, 24 May 2001 15:12:49 -0400 (EDT)
From: Mitch Halmu <mitch@netside.net>
To: Dave Rand <dlr@bungi.com>
Cc: "Eric A. Hall" <ehall@ehsco.com>, nanog@merit.edu
In-Reply-To: <m152zXB-0000e7C@daver.bungi.com>
Message-ID: <Pine.SOL.3.91.1010524145755.2647r-100000@sunny.netside.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
On Thu, 24 May 2001, Dave Rand wrote:
> That's why I think that port 25 blocking is the only way. That, and
> closing open relays, of course.
No, that is NOT the only way. We presume that the spammer had 8 dial-up
accounts. Who is this professional spammer, and how come he/she/it can
still find a provider? That is the question. Perhaps also who is the
merchant that ordered the promotion?
The identity of such individual or company belongs on a black list.
Yet the spammer is able to subscribe again tomorrow, next week, next
year... and nothing happens to them. That is the point where control
should be exercised.
--Mitch
NetSide