Er - a couple of ways

1. If you run a farm of mail servers, something like splunk for your logs is 
kind of necessary.  How difficult is it going to be to trigger a splunk alert 
on whatever looks like an administrative block?  Either by a large provider, or 
by a DNS block list.

2. You can rsync spamhaus and grep for mentions of your ASN, get ISP feedback 
loops etc.

On a larger topic - NANOG and M3AAWG (also RIPE and M3AAWG’s summer meeting in 
Europe) really ought to collocate or at least be back to back in the same city 
somewhere down the line - maybe with a day’s worth of joint sessions on topics 
of mutual interest (malware detection and mitigation, DDoS filtering .. there’s 
a lot going on in M3AAWG that’s not plain old mail or even messaging)

It still won’t solve the larger problem that a lot of routing and DNS folks 
won’t find it of interest, but well, over the decade ++ I’ve been around M3AAWG 
I see an ever increasing number of (security focused, mainly) *nog regulars 
turn up there.

—srs

> On 29-Jul-2015, at 10:37 AM, Bob Evans <b...@fiberinternetcenter.com> wrote:
> 
> I see that point - however, spamhaus has become a haus-hold word these
> days and everyone runs into these issues....its not malware or bots we
> block from a network level blackhole. Yet it is basic network operations
> these days to have to deal with someone complaining about their hacked
> mail server is now fixed yet they cant get mail. We usually tell them the
> quickest way is to address spamhaus to get it removed and in parallel also
> move the mail server to a new IP and change the dns and rDNS to the new
> one. It gets us out of having to help with these RBL issues.
> 
> When an RBL sends a notice we jump on it and get it to the
> customer...however, they usually dont send us or the customer anything.

Reply via email to