[63814] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SOLVED? was Re: contact at yahoo mail?...

daemon@ATHENA.MIT.EDU (Scott Stursa)
Fri Oct 10 12:12:14 2003

Date: Fri, 10 Oct 2003 11:59:56 -0400 (EDT)
From: Scott Stursa <stursa@acns.fsu.edu>
To: Mark Jeftovic <markjr@easydns.com>
Cc: nanog@merit.org
In-Reply-To: <20031010130311.GA28449@outblaze.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Fri, 10 Oct 2003, Suresh Ramasubramanian wrote:

> Mark Jeftovic [10/10/03 08:33 -0400]:
> >
> > I've received an email offlist that this problem should be back to
> > "pre-yesterday" conditions. It looks better on our end, as it should for
> > all else affected I would think.
>
> Our problem looks considerably larger than pre yesterday conditions now :(
>
> I'd appreciate a contact there if you have one.

As would I.

They are blocking only the server where we put undergraduate accounts,
over 60% of which have forwarding set, most frequently to Hotmail, Yahoo
and AOL accounts. When the spam volume coming in here gets too high, our
server *appears* to be an open relay (which it is not).

The bounced messages contain a pointer to a web page which claims they
only block after running a relay test on the suspect IP, this being done
"after that IP address has been identified as source of significant suspicious
inbound traffic".

I'm wondering it they aren't bothering with the test anymore.

AOL did the same thing to us about ago. It took several days to
get that resolved.

- SLS

------------------------------------------------------------------------
Scott L. Stursa                  -                          850/644-2591
Network Security Officer                             stursa@acns.fsu.edu
Academic Computing and Network Services         Florida State University

                    - No good deed goes unpunished -

home help back first fref pref prev next nref lref last post