Re: Deny MX queries for dynamic IP pools

2010-02-08 Thread Wael Shaheen
Dear All,

Thank you for the valuable comments to this post.

Sincerely,
Wael

On 2/2/10 4:26 AM, Sven Eschenberg s...@whgl.uni-frankfurt.de wrote:

 There have been quite some posts since my first answer to Wael.
 I just wanted to rephrase some stuff etc.
 
 On Tue, February 2, 2010 00:43, Peter Dambier wrote:
 Noel Butler wrote:
 Firstly, I feel this really belongs on mailops not bind list :)
 secondly...
 
 On Mon, 2010-02-01 at 00:00 +0300, Wael Shaheen wrote:
 
 Blocking port 25 is much worse IMHO because it forces users out of the
 service, by restricting their ability to use their own mail servers
 that can
 be hosted externally. I believe good mail administrators will force
 SMTPS
 
 Blocking DNS belongs here.
 
 I don't think blocking DNS is a good idea. You are blocking access to
 zones using strictly internal DNS that is not published but only AXFRed
 and you are blocking alternative DNS. In germany alternative DNS is a
 must as many ISPs are stumbling over their own feet when implementing or
 testing censoring. Maybe some of the DNS blackouts here have been DNSSEC
 as well.
 
 Dear fellow pirate, the local situation in Germany might not be relevant
 here for Wael, esp. if he works at some ISP and there are no plans to
 manipulate DNS otherwise. Yet I do agree as I stated in my first post, I
 don't think, filtering/blocking/modifying requests in any way whatsoever
 is an appropriate approach to a non-technical problem (as I said before).
 Let it be DNS or directly blocking port 25. Here we do block port 25
 within our own network - to put it in short, if a customer thinks this
 policiy is appropriate, let the customer deploy it, don't do the customers
 job and don't give the customer options of taking legal actions because
 you break the customers setups.
 
 
 Oh, how about DNSSEC?
 
 How do you handle signatures?
 
 And you are breaking dnsbl because dnsbl is DNS at an alternative
 address. So some of your clients might accidently drop all mail
 as spam and it takes long to find such a bug if somebody else
 does maintain the mailer.
 
 That is indeed true, I did forget about those in my first post. That
 brings me back to my first argument: Don'T use technical methods for a non
 technical problem, there many good reasons not to do this.
 
 
 
 The bigger question is why are you not blocking, suspending, or
 terminating the accounts of those who you know are spamming, be it
 deliberate, or not (as the end result is the same)
 
 Cheers
 
 
 
 Cheers
 Peter and Karin
 
 
 --
 Peter and Karin Dambier
 Cesidian Root - Radice Cesidiana
 Rimbacher Strasse 16
 D-69509 Moerlenbach-Bonsweiher
 +49(6209)795-816 (Telekom)
 +49(6252)750-308 (VoIP: sipgate.de)
 mail: pe...@peter-dambier.de
 http://www.peter-dambier.de/
 http://iason.site.voila.fr/
 https://sourceforge.net/projects/iason/
 ULA= fd80:4ce1:c66a::/48
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
 
 
 Now Andrew said it pretty catchy already, let me rephrase my thoughts: Why
 do you want to use some technical approach like filtering/blocking, to
 solve a social problem. You as an ISP should have an agreement/contract
 with your customers. It's the right place, to enforce, that customers take
 action against spam. If they do not comply, willingly or due to
 incompetence, it is at your hand, to disconnect them and terminate the
 agreement, if necessary. And of course you can take additional legal
 action when needed. This is just plain simple social engineering and imho
 the only valid solution.
 
 Wael, you said something about mail hosts on dynamic IP Pools being
 'illegal' - If it is under your jurisdictional system, well, you already
 had the answer/solution, to all your problems, if not, work out an
 appropriate contract.
 
 Regards
 
 -Sven
 
 
 
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-02-01 Thread Kevin Darcy

On 1/31/2010 4:18 PM, SM wrote:

At 05:25 31-01-10, Wael Shaheen wrote:
As a solution the routing team was thinking to block port 25 for 
outgoing as

some ISPs do. However, I do not see this to be a valid solution for many
reasons such as clients that have email servers outside, or if 
decided to be
redirected to spam filters then that will just cost the company too 
much.


Mail submission is done over port 587 and not port 25.

MTA-to-MTA traffic uses port 25.

Also, older MUAs will still often use port 25 even for message 
submission, and so will spammers, if they think it will help them bypass 
anti-spam protections built into the MSA.




- Kevin




___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-02-01 Thread Matus UHLAR - fantomas
 At 05:25 31-01-10, Wael Shaheen wrote:
 As a solution the routing team was thinking to block port 25 for
 outgoing as some ISPs do. However, I do not see this to be a valid
 solution for many reasons such as clients that have email servers
 outside, or if decided to be redirected to spam filters then that will
 just cost the company too much.

 On 1/31/2010 4:18 PM, SM wrote:
 Mail submission is done over port 587 and not port 25.

On 01.02.10 13:29, Kevin Darcy wrote:
 MTA-to-MTA traffic uses port 25.

 Also, older MUAs will still often use port 25 even for message  
 submission, and so will spammers, if they think it will help them bypass  
 anti-spam protections built into the MSA.

those are exactly the reasons why some ISPs block port 25 access.
however this is really off-topic here. and I think DNS is really bad place
to solve this problem, as it is for failover switching and helping http
clients to find out correct site in case of mistake.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
A day without sunshine is like, night.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-02-01 Thread Sven Eschenberg
There have been quite some posts since my first answer to Wael.
I just wanted to rephrase some stuff etc.

On Tue, February 2, 2010 00:43, Peter Dambier wrote:
 Noel Butler wrote:
 Firstly, I feel this really belongs on mailops not bind list :)
 secondly...

 On Mon, 2010-02-01 at 00:00 +0300, Wael Shaheen wrote:

 Blocking port 25 is much worse IMHO because it forces users out of the
 service, by restricting their ability to use their own mail servers
 that can
 be hosted externally. I believe good mail administrators will force
 SMTPS

 Blocking DNS belongs here.

 I don't think blocking DNS is a good idea. You are blocking access to
 zones using strictly internal DNS that is not published but only AXFRed
 and you are blocking alternative DNS. In germany alternative DNS is a
 must as many ISPs are stumbling over their own feet when implementing or
 testing censoring. Maybe some of the DNS blackouts here have been DNSSEC
 as well.

Dear fellow pirate, the local situation in Germany might not be relevant
here for Wael, esp. if he works at some ISP and there are no plans to
manipulate DNS otherwise. Yet I do agree as I stated in my first post, I
don't think, filtering/blocking/modifying requests in any way whatsoever
is an appropriate approach to a non-technical problem (as I said before).
Let it be DNS or directly blocking port 25. Here we do block port 25
within our own network - to put it in short, if a customer thinks this
policiy is appropriate, let the customer deploy it, don't do the customers
job and don't give the customer options of taking legal actions because
you break the customers setups.


 Oh, how about DNSSEC?

 How do you handle signatures?

 And you are breaking dnsbl because dnsbl is DNS at an alternative
 address. So some of your clients might accidently drop all mail
 as spam and it takes long to find such a bug if somebody else
 does maintain the mailer.

That is indeed true, I did forget about those in my first post. That
brings me back to my first argument: Don'T use technical methods for a non
technical problem, there many good reasons not to do this.



 The bigger question is why are you not blocking, suspending, or
 terminating the accounts of those who you know are spamming, be it
 deliberate, or not (as the end result is the same)

 Cheers



 Cheers
 Peter and Karin


 --
 Peter and Karin Dambier
 Cesidian Root - Radice Cesidiana
 Rimbacher Strasse 16
 D-69509 Moerlenbach-Bonsweiher
 +49(6209)795-816 (Telekom)
 +49(6252)750-308 (VoIP: sipgate.de)
 mail: pe...@peter-dambier.de
 http://www.peter-dambier.de/
 http://iason.site.voila.fr/
 https://sourceforge.net/projects/iason/
 ULA= fd80:4ce1:c66a::/48
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users


Now Andrew said it pretty catchy already, let me rephrase my thoughts: Why
do you want to use some technical approach like filtering/blocking, to
solve a social problem. You as an ISP should have an agreement/contract
with your customers. It's the right place, to enforce, that customers take
action against spam. If they do not comply, willingly or due to
incompetence, it is at your hand, to disconnect them and terminate the
agreement, if necessary. And of course you can take additional legal
action when needed. This is just plain simple social engineering and imho
the only valid solution.

Wael, you said something about mail hosts on dynamic IP Pools being
'illegal' - If it is under your jurisdictional system, well, you already
had the answer/solution, to all your problems, if not, work out an
appropriate contract.

Regards

-Sven



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Deny MX queries for dynamic IP pools

2010-01-31 Thread Wael Shaheen
Dear DNS Experts,

This post is intended for discussion.

The ISP I work for has HUGE dynamic IP pools that are full of spammers (of
course). This huge volume of spam is actually influencing the decision for
some of the international provider¹s whether to give us links or not let
alone the bad reputation and RBLs listing etc...
As a solution the routing team was thinking to block port 25 for outgoing as
some ISPs do. However, I do not see this to be a valid solution for many
reasons such as clients that have email servers outside, or if decided to be
redirected to spam filters then that will just cost the company too much.

Luckily we have two set of DNS server farms; one that is serving static IP
users and one that is dedicated only for dynamic IP users. The idea I have
proposed is to deny these dynamic users from performing MX queries.

So instead of blocking port 25 we can redirect the DNS port to the DNS farm
that is dedicated for dynamic users, that will guarantee that no standard
DNS port forwarded queries are going to external servers. Then we will block
the MX and root queries for those dynamic clients.
That will prevent them from using a locally installed DNS service on their
machines or query MX records for targets they want to send spam to.

Of course there will still be some challenges like if some spammers know the
A record of the mail server they want to connect to or if they used the IP
address of the targeted mail server also if they used open dns that works on
non-standard ports, but then again I believe these users will stand out and
will be identified more easily.

I would appreciate any comments you may have.

Sincerely,
Wael


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-01-31 Thread Sven Eschenberg
Dear Wael,

In what way is blocking Port 25 any worse than blocking MX/root queries
for clients? Both solutions neglect the fact, that spam is not a technical
problem.
Some ISPs think it is a good idea to forward you to a search web page,
when you mispell some URL, this is done via DNS. Obviously, if the
customer dislikes this, the customer will (and can) use his/her own
recursor, stupidity of ISP solved - if the ISP would prevent the customer
from doing this, the customer might not be a customer any longer.

Just my 2 cents.

-Sven


On Sun, January 31, 2010 14:25, Wael Shaheen wrote:
 Dear DNS Experts,

 This post is intended for discussion.

 The ISP I work for has HUGE dynamic IP pools that are full of spammers (of
 course). This huge volume of spam is actually influencing the decision for
 some of the international provider¹s whether to give us links or not let
 alone the bad reputation and RBLs listing etc...
 As a solution the routing team was thinking to block port 25 for outgoing
 as
 some ISPs do. However, I do not see this to be a valid solution for many
 reasons such as clients that have email servers outside, or if decided to
 be
 redirected to spam filters then that will just cost the company too much.

 Luckily we have two set of DNS server farms; one that is serving static IP
 users and one that is dedicated only for dynamic IP users. The idea I have
 proposed is to deny these dynamic users from performing MX queries.

 So instead of blocking port 25 we can redirect the DNS port to the DNS
 farm
 that is dedicated for dynamic users, that will guarantee that no standard
 DNS port forwarded queries are going to external servers. Then we will
 block
 the MX and root queries for those dynamic clients.
 That will prevent them from using a locally installed DNS service on their
 machines or query MX records for targets they want to send spam to.

 Of course there will still be some challenges like if some spammers know
 the
 A record of the mail server they want to connect to or if they used the IP
 address of the targeted mail server also if they used open dns that works
 on
 non-standard ports, but then again I believe these users will stand out
 and
 will be identified more easily.

 I would appreciate any comments you may have.

 Sincerely,
 Wael


 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-01-31 Thread Sten Carlsen
To me this seems to be a firewall/routing issue. If you know for sure
that some IP is sending spam, if you can not stop them, then at least
you can block their outgoing access to port 25.

Alternatively and maybe better arrange for a proxy server to do
filtering and discard spam. The proxy solution is actually used many
places and works reasonably well also for non-spammers.


Sven Eschenberg wrote:
 Dear Wael,

 In what way is blocking Port 25 any worse than blocking MX/root queries
 for clients? Both solutions neglect the fact, that spam is not a technical
 problem.
 Some ISPs think it is a good idea to forward you to a search web page,
 when you mispell some URL, this is done via DNS. Obviously, if the
 customer dislikes this, the customer will (and can) use his/her own
 recursor, stupidity of ISP solved - if the ISP would prevent the customer
 from doing this, the customer might not be a customer any longer.

 Just my 2 cents.

 -Sven


 On Sun, January 31, 2010 14:25, Wael Shaheen wrote:
   
 Dear DNS Experts,

 This post is intended for discussion.

 The ISP I work for has HUGE dynamic IP pools that are full of spammers (of
 course). This huge volume of spam is actually influencing the decision for
 some of the international provider¹s whether to give us links or not let
 alone the bad reputation and RBLs listing etc...
 As a solution the routing team was thinking to block port 25 for outgoing
 as
 some ISPs do. However, I do not see this to be a valid solution for many
 reasons such as clients that have email servers outside, or if decided to
 be
 redirected to spam filters then that will just cost the company too much.

 Luckily we have two set of DNS server farms; one that is serving static IP
 users and one that is dedicated only for dynamic IP users. The idea I have
 proposed is to deny these dynamic users from performing MX queries.

 So instead of blocking port 25 we can redirect the DNS port to the DNS
 farm
 that is dedicated for dynamic users, that will guarantee that no standard
 DNS port forwarded queries are going to external servers. Then we will
 block
 the MX and root queries for those dynamic clients.
 That will prevent them from using a locally installed DNS service on their
 machines or query MX records for targets they want to send spam to.

 Of course there will still be some challenges like if some spammers know
 the
 A record of the mail server they want to connect to or if they used the IP
 address of the targeted mail server also if they used open dns that works
 on
 non-standard ports, but then again I believe these users will stand out
 and
 will be identified more easily.

 I would appreciate any comments you may have.

 Sincerely,
 Wael


 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

 


 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
   

-- 
Best regards

Sten Carlsen

No improvements come from shouting:

   MALE BOVINE MANURE!!! 

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-01-31 Thread Wael Shaheen

Hi,

On 1/31/10 5:17 PM, Sven Eschenberg s...@whgl.uni-frankfurt.de wrote:

 Dear Wael,
 
 In what way is blocking Port 25 any worse than blocking MX/root queries
 for clients? Both solutions neglect the fact, that spam is not a technical
 problem.

This spam issue is major for DSPs and large ISPs. Their reputation is key in
acquiring connections from some major international providers. This brings
the issue to a very high priority for connectivity is the most important
part.
Blocking port 25 is much worse IMHO because it forces users out of the
service, by restricting their ability to use their own mail servers that can
be hosted externally. I believe good mail administrators will force SMTPS
which uses a different port but then again a lot wont, and hence blocking
SMTP service will deny all of these users from accessing their email servers
and most of these users are not technically educated enough to find a
workaround.

On the other hand denying the dynamic user MX/root queries will affect users
that have installed mail servers on their systems or otherwise infected and
both of these scenarios are illegal for dynamically assigned IPs.
 
 Some ISPs think it is a good idea to forward you to a search web page,
 when you mispell some URL, this is done via DNS. Obviously, if the
 customer dislikes this, the customer will (and can) use his/her own
 recursor,

We do not redirect users if they misspelled their destinations and we do not
manipulate DNS replies in any way. Some users may choose to use their own
installed DNS service, but then again if your service provider has a stable
DNS service and a good and stable internet connection then would that
overcome this disadvantage? At the end I think that something has to be
sacrificed.

Sincerely,
Wael Shaheen


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-01-31 Thread Wael Shaheen
Hi,


On 1/31/10 5:28 PM, Sten Carlsen st...@s-carlsen.dk wrote:

 To me this seems to be a firewall/routing issue. If you know for sure
 that some IP is sending spam, if you can not stop them, then at least
 you can block their outgoing access to port 25.

Most of the RBLs list dynamic IP addresses for they should not be sending
emails whatsoever in most cases. Identifying the the origin of the spam in
huge networks with thousands of compromised machines is not an easy task and
blocking the port 25 based on that network analysis will produce false
positives for these are dynamically assigned IP addresses and will change
with every time the user connects.

 
 Alternatively and maybe better arrange for a proxy server to do
 filtering and discard spam. The proxy solution is actually used many
 places and works reasonably well also for non-spammers.

The email proxy can work in many places but I am not sure it would in a DSP,
or a big ISP.
If you want to cope with the email volume that is being generated by
hundreds of thousands of clients then you will need to build a monster
solution. Not only that, you also may cause your users legitimate emails to
be rejected or flagged as SPAM for they will be sent from a destination
other than their email server.

Regards,
Wael


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-01-31 Thread SM

At 05:25 31-01-10, Wael Shaheen wrote:

As a solution the routing team was thinking to block port 25 for outgoing as
some ISPs do. However, I do not see this to be a valid solution for many
reasons such as clients that have email servers outside, or if decided to be
redirected to spam filters then that will just cost the company too much.


Mail submission is done over port 587 and not port 25.


Luckily we have two set of DNS server farms; one that is serving static IP
users and one that is dedicated only for dynamic IP users. The idea I have
proposed is to deny these dynamic users from performing MX queries.

So instead of blocking port 25 we can redirect the DNS port to the DNS farm
that is dedicated for dynamic users, that will guarantee that no standard
DNS port forwarded queries are going to external servers. Then we will block
the MX and root queries for those dynamic clients.
That will prevent them from using a locally installed DNS service on their
machines or query MX records for targets they want to send spam to.


That can be bypassed as you explained below.


Of course there will still be some challenges like if some spammers know the
A record of the mail server they want to connect to or if they used the IP
address of the targeted mail server also if they used open dns that works on
non-standard ports, but then again I believe these users will stand out and
will be identified more easily.


The idea is another variation of the walled garden.  You could look 
into doing traffic flow analysis and using feedback reports to 
identify the source of the abuse.


Regards,
-sm 


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-01-31 Thread Jason W.
On Sun, Jan 31, 2010 at 8:25 AM, Wael Shaheen wael.sha...@gmail.com wrote:

 As a solution the routing team was thinking to block port 25 for outgoing as
 some ISPs do. However, I do not see this to be a valid solution for many
 reasons such as clients that have email servers outside, or if decided to be
 redirected to spam filters then that will just cost the company too much.

 Luckily we have two set of DNS server farms; one that is serving static IP
 users and one that is dedicated only for dynamic IP users. The idea I have
 proposed is to deny these dynamic users from performing MX queries.

Perhaps you may want to join mailops or one of the other mail admin
lists. IMO, this problem (reducing spam emitted from your company's
network) isn't one DNS should be used to fix. I believe that people
on mail admin forums would be able to share current best current
practices for ISPs/NSPs in your situation.

-- 
HTH, YMMV, HANW :)

Jason

The path to enlightenment is /usr/bin/enlightenment.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-01-31 Thread Mark Andrews

In message c78b5f8c.46e43%wael.sha...@gmail.com, Wael Shaheen writes:
 Dear DNS Experts,
 
 This post is intended for discussion.
 
 The ISP I work for has HUGE dynamic IP pools that are full of spammers (of
 course). This huge volume of spam is actually influencing the decision for
 some of the international provider=B9s whether to give us links or not let
 alone the bad reputation and RBLs listing etc...
 As a solution the routing team was thinking to block port 25 for outgoing as
 some ISPs do. However, I do not see this to be a valid solution for many
 reasons such as clients that have email servers outside, or if decided to be
 redirected to spam filters then that will just cost the company too much.
 
 Luckily we have two set of DNS server farms; one that is serving static IP
 users and one that is dedicated only for dynamic IP users. The idea I have
 proposed is to deny these dynamic users from performing MX queries.
 
 So instead of blocking port 25 we can redirect the DNS port to the DNS farm
 that is dedicated for dynamic users, that will guarantee that no standard
 DNS port forwarded queries are going to external servers. Then we will block
 the MX and root queries for those dynamic clients.
 That will prevent them from using a locally installed DNS service on their
 machines or query MX records for targets they want to send spam to.
 
 Of course there will still be some challenges like if some spammers know the
 A record of the mail server they want to connect to or if they used the IP
 address of the targeted mail server also if they used open dns that works on
 non-standard ports, but then again I believe these users will stand out and
 will be identified more easily.
 
 I would appreciate any comments you may have.
 
 Sincerely,
 Wael
 
 
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

Firstly, cleanup / quarantine the machines that are spamming.  This
is the best thing you can do.  A machine that is spamming is
compromised and a compromised machine can do anything.

Secondly, don't block the MX queries.  MUAs can and do perform MX
queries to check that addresses are valid before attempting to
send anything.

Thirdly, if you do block SMTP do it fully (traffic to and from port
25) and provide a mechanism to optout.  If you publish, or provide
information to those that publish, blocking lists ensure that they
reflect the optout status of any IP address that has opted out.
Blocking SMTP traffic is only masking the symptoms of the infection.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Deny MX queries for dynamic IP pools

2010-01-31 Thread Noel Butler
Firstly, I feel this really belongs on mailops not bind list :)
secondly...

On Mon, 2010-02-01 at 00:00 +0300, Wael Shaheen wrote:


 Blocking port 25 is much worse IMHO because it forces users out of the
 service, by restricting their ability to use their own mail servers that can
 be hosted externally. I believe good mail administrators will force SMTPS


The bigger question is why are you not blocking, suspending, or
terminating the accounts of those who you know are spamming, be it
deliberate, or not (as the end result is the same)

Cheers

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users