-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Raymond L. Corbin wrote:
> Yeah, but without them saying which IP's are causing the problems you can't 
> really tell which servers in a datacenter are forwarding their spam/abusing 
> Yahoo. Once the /24 block is in place then they claim to have no way of 
> knowing who actually caused the block on the /24. The feedback loop would 
> help depending on your network size. When you have a few hundred thousand 
> clients, and those clients have clients, and they even have client, it simply 
> floods your abuse desk with complaints from Yahoo when it is obviously 
> forwarded spam. So it's more of pick your poison deal with customer 
> complaints about not being able to send to yahoo for a few days or get your 
> abuse desk flooded with complaints which hinders solving actual issues like 
> compromised accounts.

I look at all my mail server log files and see which logs show obvious spam
being forwarded (a lot of times the MAIL FROM address is a dead giveaway) or
I tail -F the mail log for a bit and watch the spam coming in and forwarding
back out. When I see the forwarding domain that's who I have contacted to
upsell some spam filtering. But, we're a small ISP, so I don't have
thousands, let alone hundreds of thousands of clients, to deal with...



Chris

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Mandriva - http://enigmail.mozdev.org

iD8DBQFH/nORnSVip47FEdMRCi+HAJ9CJoJ/VAkEssv6TznwcYQVGVWkIACfRwhI
VYw0v4HWI8mWs2SHEF3jnq0=
=YMQR
-----END PGP SIGNATURE-----

Reply via email to