[74634] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: short Botnet list and Cashing in on DoS

daemon@ATHENA.MIT.EDU (Petri Helenius)
Sat Oct 9 14:43:28 2004

Date: Sat, 09 Oct 2004 21:42:43 +0300
From: Petri Helenius <pete@he.iki.fi>
To: Gadi Evron <ge@linuxbox.org>
Cc: Paul Vixie <vixie@vix.com>, nanog@merit.edu
In-Reply-To: <41682F74.90103@linuxbox.org>
Errors-To: owner-nanog-outgoing@merit.edu


Gadi Evron wrote:

>
> Blocking port 25 for dynamic ranges means they can't send email, so 
> that drone are pretty useless for spammers on that account. Trojan 
> horses would have to use local information for the user's own account 
> (from Outlook or such).
>
Next you'll block SIP if we start getting "spam calls"? Or any other 
application that pops up and is used by the same people sending spam today?

> ISP's could then, I suppose, limit every user to 5 emails a minute (or 
> any other number).
>
> That combined with domain-keys and sender-ID could make for a much 
> prettier Internet, don't you think?
>
You're fixing the symptom, not curing the cause. The immediate root 
cause is a compromised PC which among other things does send mail across 
port 25. Itīll also send mail using x-y-z webmail or misconfigured 
forms, etc.

> Abuse using port 25 is a major issue today, why not solve it? If a 
> user wants it open, they could always ask for it or even pay more 
> money. Perhaps move to a static IP?

It would be much more beneficial to deny all packets from AS's which 
don't have abuse in control.

Pete


home help back first fref pref prev next nref lref last post