As long as the blocking is targeted and responsibly implemented I don't have any particular issues
More than one large corporation has hotel California style blocks though --srs > On 01-Jun-2016, at 10:43 AM, Shane Clay <sh...@caznet.com.au> wrote: > > Our block of this /24 will only be temporary. We'll remove it when we've > assessed the amount of spam (in fact, the only concern we really have is > these Cryptolocker downloaders) has reduced to a level our clients will be > happy with. > > We are rejecting email with a 500 error. The sender will be aware of it and > the response will be clear - your IP is blacklisted. > > Before implementing this IP block we did review logs for the past few weeks > to determine impact. As I said, it's essentially zero. All we are really > blocking is this most recent spam blast. > > We're a specialist provider, not a mass MTA. Our clients pay us specifically > for managing risk for them. In our view, we've made the appropriate call at > this time. We are in regular contact with the sys admins of many of our > clients and have acted in a way consistent with what they expect of us. > > Perhaps.... if more people responded in this way to poor IP > reputation/behaviour, the offending carriers would put in more effort to > actually reducing this risk of their clients using their IPs/services to be a > problem for others. > > Regards, > > > Shane Clay | Director, Senior Engineer > www.caznet.com.au > Phone 08 8464 0052 > 211 / 147 Pirie Street, Adelaide SA 5000 > > > > -----Original Message----- > From: mailop [mailto:mailop-boun...@mailop.org] On Behalf Of Suresh > Ramasubramanian > Sent: Wednesday, 1 June 2016 1:34 PM > To: Mark Foster <blak...@blakjak.net> > Cc: mailop@mailop.org > Subject: Re: [mailop] Massive Spamrun from Cox Net: 68.230.241.0/24 > > Having spent about 14 years doing postmaster / abuse / spam architecture for > a hk based ISP before my current job, I can relate to that "wider subnet > blockages" thing. > > Beyond that - I wonder just how many people > > 1. Have as many metrics as they think to accurately determine fp rates > > 2. Listen to external people who want to mail their customers (not just > marketers, ordinary people I mean) - or listen to their own customers for > that matter > > 3. Implement a clear and transparent block with an accurate reason for the > rejection and a contact mechanism (email / URL) to appeal the block, so that > the sender and recipient know just what is happening, not just "oh, this > blasted email is down again, let me resend using gmail" or "oh, it never > reached you? I wonder what happened" when your provider throws away the email > rather than deliver to junk or bounce it > > --srs > >> On 01-Jun-2016, at 8:57 AM, Mark Foster <blak...@blakjak.net> wrote: >> >> That's ok Suresh. We down-under are frequently victim of wider subnet >> blockades due to American (in particular, as a party we communicate with a >> lot) prejudices about larger subnets with smaller chunks routed to other >> APNIC member countries such as China and Korea. So I suppose it's all fair >> :-) >> >> On my (private, personal) MTA I have several /24's (and bigger) permanently >> blocked due to the SNR being almost entirely, well, N. I can only assume >> that Shane has performed a similar analysis in order to take that particular >> response - or that the response is temporary. >> >> When I saw Benoit's post I did look at some of the particularly nasty >> spam-run my company had this morning, unfortunately a different /24 (in an >> adjacent /16) and only a small proportion of the total spam-run originated >> from that particular IP range. Still it helps emphasise that there's an >> awful lot of compromised end-user-IP-addresses in the US, and even more >> "Legit" enterprises that are tacitly (or not) allowing spammy behavior to go >> on under some sort of 'guise' of legitimacy. >> >> One recent example I saw came out of 'en25.com' but when searching my inbox >> for an example, I discovered that Twitter appear to be a legitimate customer >> of their services. :( >> >> Resorting to IP range blocks is always a mixed-bag, but as long as providers >> who do so remain aware of the impact and responsive to any genuine >> false-positives that result, it is a far more 'useful' response than pretty >> much anything available to 'foreign' network operators. >> >> Mark Foster >> Wellington, New Zealand >> >> >>> On 1/06/2016 3:14 p.m., Suresh Ramasubramanian wrote: >>> With multiple million legitimate users of one of the largest broadband >>> providers in the USA also mailing through the /24. >>> >>> Brilliant, I must say. You must enjoy hearing false positive reports from >>> your users. >>> >>> --srs >>> >>>> On 01-Jun-2016, at 8:02 AM, Shane Clay <sh...@caznet.com.au> wrote: >>>> >>>> We're seeing the same and have also blocked that /24. >>>> >>>> Regards, >>>> >>>> >>>> Shane Clay | Director, Senior Engineer >>>> www.caznet.com.au >>>> Phone 08 8464 0052 >>>> 211 / 147 Pirie Street, Adelaide SA 5000 >>>> >>>> >>>> >>>> -----Original Message----- >>>> From: mailop [mailto:mailop-boun...@mailop.org] On Behalf Of Benoit >>>> Panizzon >>>> Sent: Tuesday, 31 May 2016 11:41 PM >>>> To: mailop@mailop.org >>>> Subject: [mailop] Massive Spamrun from Cox Net: 68.230.241.0/24 >>>> >>>> Hello >>>> >>>> At the moment we see a very large amount of emails containing Microsoft >>>> Office Documents containing malware, all originating from IP Addresses in >>>> the Range: 68.230.241.0/24 >>>> >>>> We therefore blocked that range. >>>> >>>> Anyone else? Maybe a Cox.Net Email Admin reading this list? >>>> >>>> -BenoƮt Panizzon- >>>> -- >>>> I m p r o W a r e A G - Leiter Commerce Kunden >>>> ______________________________________________________ >>>> >>>> Zurlindenstrasse 29 Tel +41 61 826 93 00 >>>> CH-4133 Pratteln Fax +41 61 826 93 01 >>>> Schweiz Web http://www.imp.ch >>>> ______________________________________________________ >>>> >>>> _______________________________________________ >>>> mailop mailing list >>>> mailop@mailop.org >>>> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop >>>> _______________________________________________ >>>> mailop mailing list >>>> mailop@mailop.org >>>> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop >>> _______________________________________________ >>> mailop mailing list >>> mailop@mailop.org >>> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop >> >> >> _______________________________________________ >> mailop mailing list >> mailop@mailop.org >> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop > > _______________________________________________ > mailop mailing list > mailop@mailop.org > https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop _______________________________________________ mailop mailing list mailop@mailop.org https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop