[56779] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

[Fwd: FC: Email a RoadRunner address, get scanned by their

daemon@ATHENA.MIT.EDU (William Allen Simpson)
Fri Mar 14 23:13:36 2003

Date: Fri, 14 Mar 2003 21:32:09 -0500
From: William Allen Simpson <wsimpson@greendragon.com>
To: North American Network Operators Group <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu




-------- Original Message --------
Subject: FC: Email a RoadRunner address, get scanned by their securitysystem
Date: Fri, 14 Mar 2003 15:25:46 -0500
From: Declan McCullagh <declan@well.com>
Reply-To: declan@well.com
To: politech@politechbot.com


---

Date: Fri, 14 Mar 2003 15:22:24 -0500
Subject: RoadRunner Automated Portscans
From: Gunnar Hellekson <gunnar@onepeople.org>
To: declan@well.com

After sending an email to a friend at a RoadRunner address, I see this in 
my web access log:

24.30.199.228 - - [13/Mar/2003:15:11:25 -0500] "CONNECT security.rr.com:25 
HTTP/1.0" 404 535 "" ""

Basically, RoadRunner tried to spam themselves using my server.  I mailed 
abuse@rr.com about this, and received a canned response, enclosed.  It's a 
humble response, but woefully inadequate.  Have anti-spam measures come to 
this?  This seems like an ill-considered compromise between privacy and 
anti-spam efforts.  A blunt instrument that betrays less-than-careful 
thinking.  The opt-out option, which was revealed only after my complaint, 
is even more obnoxious.

Under their logic, I feel entitled to poke and prod their customers, just 
to make sure they don't spam me.  Is that fair?  I promise to provide an 
opt-out if anyone complains.

I'm curious whether this preemptive measure is effective at all.

-Gunnar

>From: "Road Runner Security \[DSR\]" <abuse@rr.com>
>Date: Fri Mar 14, 2003  2:05:12 PM America/New_York
>Subject: Re: Port scans?
>
>Hello,
>
>The securityscan.sec.rr.com machine is a Road Runner Security resource that
>is used as a tool to assist us in determining if machines being used to
>send us mail may be abused from outside sources, allowing them to be used
>to spam our customers and role accounts. We fully understand your concerns
>surrounding the probing of your machine. This issue has been raised
>internally and we hope this email helps you better understand our process.
>
>The intention of this process is truly not meant to be a "big brother"
>system, but we understand that some may view it as such. Our ultimate goal,
>however, is to protect our network, our customers, and our role accounts.
>
>Road Runner has begin the REACTIVE testing of IP addresses which connect 
>to its inbound SMTP gateways. If your machine connects to ours to send 
>email, we reserve the absolute right to perform SMTP relay and open proxy 
>server tests upon the connecting IP address to ensure that the machine at 
>that IP address cannot be abused for malicious > purposes.
>
>These scans are done once per week per IP, via an automated process, and 
>only on those servers that have sent our subscriber base mail. The only 
>way for these tests to occur is if an IP address connects to our inbound 
>SMTP gateway. If found to be an open proxy or smtp relay, the IP address 
>will be blocked at our mail gateway borders with one of the following 
>error messages:
>
>ERROR:5.7.1:550 Mail Refused - See 
>http://security.rr.com/mail_blocks.htm#proxy
>ERROR:5.7.1:550 Mail Refused - See 
>http://security.rr.com/mail_blocks.htm#relay
>
>We understand that some entities may not wish to be scanned as part of this
>automated process. If you do not wish to be tested by Road Runner, there
>are two ways to accomplish this:
>
>1. Send an e-mail to 'donottest@security.rr.com' with the IP address that
>you do not wish to be tested. Please note that if you are not the
>designated contact for your IP address range (for example, if you are on a
>cable modem, DSL, or dialup range), we will be unable to fulfill your
>request for addition or removal.
>2. Do not connect to our inbound SMTP servers. Again, this test is only
>conducted on servers that connect to our servers.
>
>If you have any further questions, you can visit http://security.rr.com or
>contact Road Runner Security via e-mail at 'spamblock@security.rr.com'
>
>Regards,
>Road Runner Security





-------------------------------------------------------------------------
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if you include this notice.
To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
Like Politech? Make a donation here: http://www.politechbot.com/donate/
-------------------------------------------------------------------------
Declan McCullagh's photographs are at http://www.mccullagh.org/
-------------------------------------------------------------------------

home help back first fref pref prev next nref lref last post