[96789] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Interesting new dns failures

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Thu May 24 22:54:58 2007

Date: Fri, 25 May 2007 08:23:51 +0530
From: "Suresh Ramasubramanian" <ops.lists@gmail.com>
To: "John LaCour" <johnlacour@gmail.com>
Cc: "David Ulevitch" <davidu@everydns.net>,
	"Douglas Otis" <dotis@mail-abuse.org>,
	"Gadi Evron" <ge@linuxbox.org>,
	"Chris L. Morrow" <christopher.morrow@verizonbusiness.com>,
	nanog@merit.edu
In-Reply-To: <1ea4ea7a0705241504w5ce37c0eg82e2fab60769f7c5@mail.gmail.com>
Errors-To: owner-nanog@merit.edu


On 5/25/07, John LaCour <johnlacour@gmail.com> wrote:
> If you're an network operator and you'd consider null routing IPs
> associated with nameservers used only by phishers, please let me know
> and we'll be happy to provide the appropriate evidence.

Half of them are on fastflux so nullroutes wouldnt help.  Some
mailservers (recent postfix) allow you to block by NS, or there's
always the good old expedient of bogusing these out in your bind
resolver config, or serving up a fake zone for them.

-- 
Suresh Ramasubramanian (ops.lists@gmail.com)

home help back first fref pref prev next nref lref last post