[84815] in North American Network Operators' Group
Re: 209.68.1.140 (209.68.1.0 /24) blocked by bellsouth.net for SMTP
daemon@ATHENA.MIT.EDU (Michael Loftis)
Mon Sep 26 03:46:57 2005
Date: Mon, 26 Sep 2005 01:44:56 -0600
From: Michael Loftis <mloftis@wgops.com>
To: Suresh Ramasubramanian <ops.lists@gmail.com>
Cc: sigma@smx.pair.com, nanog@nanog.org
In-Reply-To: <bb0e440a050925202935fbfc56@mail.gmail.com>
X-MailScanner-From: mloftis@wgops.com
Errors-To: owner-nanog@merit.edu
--On September 26, 2005 8:59:31 AM +0530 Suresh Ramasubramanian
<ops.lists@gmail.com> wrote:
> On 25/09/05, Michael Loftis <mloftis@wgops.com> wrote:
>> result in me having to call postmaster to get them to remove it. Also
>> just one hacked webform usually results in the same problem (we have
>> thousands of web hosting customers). It's in our projects list to find
>> 'some way' to rate limit individual senders but it's not a high priority
>> right now.
>
> One hacked webform can pump out as much spam in a few hours as the
> rest of your users would send email to AOL in a week.
I realise this, but that's usually not the case. Almost without fail we
notice and shut it down long before aol starts blocking, and clear out the
queues of anything pending from the spammer. then hours or a day later AOL
blocks us for something that's been dealt with. :/