[65291] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBLs in use

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Thu Nov 20 11:01:01 2003

Date: Thu, 20 Nov 2003 10:59:06 -0500
From: Suresh Ramasubramanian <suresh@outblaze.com>
To: "Paul S. Brown" <pol@geekstuff.co.uk>
Cc: todd glassey <tglassey@Stanford.edu>,
	todd glassey <todd.glassey@worldnet.att.net>, nanog@merit.edu
In-Reply-To: <200311201551.44814.pol@geekstuff.co.uk>
Errors-To: owner-nanog-outgoing@merit.edu


Paul S. Brown writes on 11/20/2003 10:51 AM:

> For example something like the old Dorkslayers lists should be ignored because 
> they would blacklist you if you sneezed at the wrong time, however MAPS is 
> probably a good list.

You need a fairly wide coverage of BLs.

# Open proxies - http://opm.blitzed.org and 
http://proxies.blackholes.easynet.nl

# Open relays - http://www.ordb.org

# Dialup and DSL/cable dynamic IPs - http://dynablock.easynet.nl

# Current spam sources - http://cbl.abuseat.org [strongly recommended]

# Direct spam sources - SBL (http://www.spamhaus.org) and possibly 
spews.org as well, though spews tends to produce a lot of collateral 
damage by design.  SBL is a lot more surgical.

	srs

-- 
srs (postmaster|suresh)@outblaze.com // gpg : EDEDEFB9
manager, outblaze.com security and antispam operations

home help back first fref pref prev next nref lref last post