[65291] in North American Network Operators' Group
Re: RBLs in use
daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Thu Nov 20 11:01:01 2003
Date: Thu, 20 Nov 2003 10:59:06 -0500
From: Suresh Ramasubramanian <suresh@outblaze.com>
To: "Paul S. Brown" <pol@geekstuff.co.uk>
Cc: todd glassey <tglassey@Stanford.edu>,
todd glassey <todd.glassey@worldnet.att.net>, nanog@merit.edu
In-Reply-To: <200311201551.44814.pol@geekstuff.co.uk>
Errors-To: owner-nanog-outgoing@merit.edu
Paul S. Brown writes on 11/20/2003 10:51 AM:
> For example something like the old Dorkslayers lists should be ignored because
> they would blacklist you if you sneezed at the wrong time, however MAPS is
> probably a good list.
You need a fairly wide coverage of BLs.
# Open proxies - http://opm.blitzed.org and
http://proxies.blackholes.easynet.nl
# Open relays - http://www.ordb.org
# Dialup and DSL/cable dynamic IPs - http://dynablock.easynet.nl
# Current spam sources - http://cbl.abuseat.org [strongly recommended]
# Direct spam sources - SBL (http://www.spamhaus.org) and possibly
spews.org as well, though spews tends to produce a lot of collateral
damage by design. SBL is a lot more surgical.
srs
--
srs (postmaster|suresh)@outblaze.com // gpg : EDEDEFB9
manager, outblaze.com security and antispam operations