[54144] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Spam. Again.. -- and blocking net blocks?

daemon@ATHENA.MIT.EDU (Jason Lixfeld)
Tue Dec 10 20:55:46 2002

From: Jason Lixfeld <jlixfeld@andromedas.com>
To: Scott Silzer <scotts@primus.ca>
Cc: David Schwartz <davids@webmaster.com>,
	"'nanog@nanog.org'" <nanog@nanog.org>
In-Reply-To: <p05200f00ba1c415e198d@[192.168.1.69]>
Date: 10 Dec 2002 20:54:14 -0500
X-MDaemon-Deliver-To: nanog@nanog.org
Reply-To: jlixfeld@andromedas.com
Errors-To: owner-nanog-outgoing@merit.edu


I like Segal's DoS idea, except instead of the packet generators, let's
be nice and just DDoS port 25 on the sunzofbiatches mail servers/load
balancers...

fight fire with fire... :)

On Tue, 2002-12-10 at 20:39, Scott Silzer wrote:
> That is exactly what was done to  to Futureway  a third party spammed 
> for a site hosted by a downstream ISP and the result was there entire 
> network begging blacklisted by SPEWS.
> 
> At 15:41 -0800 12/10/2002, David Schwartz wrote:
> >On Tue, 10 Dec 2002 15:45:29 -0500, Scott Silzer wrote:
> >
> >>I could understand if an ISP was allowing spam from a portion of
> >>there network.  But in this case the only thing that the ISP did is
> >>host a website, the SPAM was sent from from a third party's network.
> >>The ISP did terminate the customer but in the meantime the entire
> >>NSP's network has been blacklisted, for a rouge webhosting account
> >>does sound a bit harsh.
> >
> >	A spam blocking service that worked that way would be 
> >useless. Anyone could
> >get any site they didn't like blacklisted simply by spamvertising it. Anyone
> >who uses a spam blocking list that works that way is DoSing themselves.
> >
> >	DS
-- 
-JaL

"AFAIK, You think I'm a BOFH for continually bashing you over the head
 with a clue-by-four.  OTOH, if you would just RTFM every once in a 
 while, my life would suck *much* less."



home help back first fref pref prev next nref lref last post