[62921] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: monkeys.dom UPL being DDOSed to death

daemon@ATHENA.MIT.EDU (Jack Bates)
Wed Sep 24 09:56:57 2003

Date: Wed, 24 Sep 2003 08:56:28 -0500
From: Jack Bates <jbates@brightok.net>
To: "Geo." <georger@getinfo.net>
Cc: Jason Slagle <raistlin@tacorp.net>,
	Raymond Dijkxhoorn <raymond@prolocation.net>, nanog@merit.edu
In-Reply-To: <00ea01c38239$1827bcb0$231a90d8@NTAUTHORITY>
Errors-To: owner-nanog-outgoing@merit.edu


Geo. wrote:

> 
> Blacklists are just one kind of filter. If we could load software that
> allowed us to forward spams caught by other filters into it and it
> maintained a DNS blacklist we could have our servers use, we wouldn't need
> big public rbl's, everyone doing any kind of mail volume could easily run
> their own IF THE SOFTWARE WAS AVAILABLE. A distributed solution for a
> distributed problem.
> 

The benefit of using a blacklist like monkeys or ordb is that there is 
only one removal process for all the mail servers. The issue is that 
when the webserver is dDOS'd, it is very hard for people to get removed.

Running local blacklists on common themes (such as open proxy/open 
relay) has the same issue. Yes, one can blacklist the site, but how do 
you get it delisted once the problem is fixed?

I had openrbl.org in my rejections for awhile so that people could find 
all the blacklists that they were on. Since the dDOS of openrbl, I've 
had to change it to my local scripts which don't cover near what openrbl 
did.


-Jack


home help back first fref pref prev next nref lref last post