Re: Spamcop

2004-05-11 Thread Laurence F. Sheldon, Jr.
JC Dill wrote:

It could also simply be a mistake.  The inet-access list was once 
reported as a spam source by a happy subscriber who was busy reporting 
hundreds (or thousands?) of spams and clicked /included a list post by 
accident.

--

p.s.  Please do not cc me on replies to the list.  Please reply to the 
list only, or to me only (as you prefer) but not to both.
I'm going to join the guessing game and guess that some scoring system
scored on uncommon words (hierarchical), trigger words (credit), and the
number of Cc: entries (I did not count the ones in the original, the
complaint had a bitch-list 4 or five long, some of the responses to it
have 8 or 10 Cc:'s I think--I did not count them either), the origin
(Road Runner) and so on and reached the conclusion of 'spam'.
Welcome to the world where email has been taken away from us.

--
Requiescas in pace o email
Ex turpi causa non oritur actio

http://members.cox.net/larrysheldon/




Re: Spamcop

2004-05-11 Thread Guðbjörn S . Hreinsson

Possible someone on the list didn't understand the content, didn't 
realize this was sent via a mailing lists and submitted this as a spam 
message to SPAMCOP. Less likely someone didn't know how to 
get off the mailing list and this was the result. 

In both cases the submitter exercised bad judgement. But the mailing 
list could be more helpful as well. There have been no reminders from 
the mailing list since I signed up which I think is a good policy for a 
mailing list. The mailing list only uses Precedence: bulk to mark it as 
a mailing list. 

That said, this is a case of misjudgment, albeit perhaps a premature 
and a hasty one.


Rgds,
-GSH

- Original Message - 
From: Vicky Rode [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Tuesday, May 11, 2004 6:51 PM
Subject: Spamcop


 
 Hi there,
 
 Just wondering why was my e-mail thread (Hierarchical Credit-based 
 Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just 
 trying to understand so that I don't repeat it. Below is a cut and paste 
 of the reported incident.
 
 
 Please advice.
 
 
 regards,
 /vicky
 
 
  cut here --
 
 Return-Path: [EMAIL PROTECTED]
 Received: from vamx01.mgw.rr.com ([24.28.193.148]) by
 acme-reston.va.rr.com
(Post.Office MTA v3.5.3 release 223
ID# 0-59787U25L25S0V35) with SMTP id com
for [EMAIL PROTECTED]; Mon, 10 May 2004 10:42:14 -0400
 Received: from vmx2.spamcop.net (vmx2.spamcop.net [206.14.107.117])
 by vamx01.mgw.rr.com (8.12.10/8.12.8) with ESMTP id
 i4AEkwhn017175
 for [EMAIL PROTECTED]; Mon, 10 May 2004 10:47:01 -0400 (EDT)
 Received: from sc-app3.verio.ironport.com (HELO spamcop.net)
 (192.168.11.203)
by vmx2.spamcop.net with SMTP; 10 May 2004 07:47:00 -0700
 Received: from [68.13.211.63] by spamcop.net
 with HTTP; Mon, 10 May 2004 14:47:01 GMT
 From: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: [SpamCop (24.30.181.126) id:988145978]Hierarchical Credit-based
 Queuing (HCQ): QoS
 Precedence: list
 Message-ID: [EMAIL PROTECTED]
 Date: Sun, 9 May 2004 21:36:30 -0700 (PDT)
 X-SpamCop-sourceip: 24.30.181.126
 X-Mailer: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR
 1.0.3705)
 via http://www.spamcop.net/ v1.3.4
 X-Virus-Scanned: Symantec AntiVirus Scan Engine
 
 [ SpamCop V1.3.4 ]
 This message is brief for your comfort.  Please use links below for
 details.
 
 Email from 24.30.181.126 / Sun, 9 May 2004 21:36:30 -0700 (PDT)
 http://www.spamcop.net/w3m?i=z988145978zab5cec781dcfa15ae459c11bd03b7bef
 z
 
 [ Offending message ]
 Return-path: owner-x
 Envelope-to: x
 Delivery-date: Mon, 10 May 2004 00:39:15 -0400
 Received: from [198.108.1.26] (helo=trapdoor.merit.edu)
 by wilma.widomaker.com with esmtp (Exim 3.36 #1)
 id 1BN2ZP-000Jo6-00
 for x; Mon, 10 May 2004 00:39:15 -0400
 Received: by trapdoor.merit.edu (Postfix)
 id B68EC91206; Mon, 10 May 2004 00:36:37 -0400 (EDT)
 Delivered-To: x
 Received: by trapdoor.merit.edu (Postfix, from userid 56)
 id 8645591243; Mon, 10 May 2004 00:36:37 -0400 (EDT)
 Delivered-To: x
 Received: from segue.merit.edu (segue.merit.edu [198.108.1.41])
 by trapdoor.merit.edu (Postfix) with ESMTP id 50AFD91206
 for x; Mon, 10 May 2004 00:36:34 -0400 (EDT)
 Received: by segue.merit.edu (Postfix)
 id 3B3955914F; Mon, 10 May 2004 00:36:34 -0400 (EDT)
 Delivered-To: x
 Received: from ms-smtp-02-eri0.socal.rr.com
 (ms-smtp-02-qfe0.socal.rr.com [66.75.162.134])
 by segue.merit.edu (Postfix) with ESMTP id EAB7358E5D
 for x; Mon, 10 May 2004 00:36:33 -0400 (EDT)
 Received: from [192.168.2.2] (cpe-24-30-181-126.socal.rr.com
 [24.30.181.126])
 by ms-smtp-02-eri0.socal.rr.com (8.12.10/8.12.7) with ESMTP id
 i4A4aUce025659
 for x; Sun, 9 May 2004 21:36:30 -0700 (PDT)
 Message-ID: [EMAIL PROTECTED]
 Date: Sun, 09 May 2004 21:36:41 -0700
 From: Vicky Rode [EMAIL PROTECTED]
 Reply-To: [EMAIL PROTECTED]
 User-Agent: Mozilla Thunderbird 0.6 (Windows/20040502)
 X-Accept-Language: en-us, en
 MIME-Version: 1.0
 To: x
 Subject: Hierarchical Credit-based Queuing (HCQ): QoS
 X-Enigmail-Version: 0.83.6.0
 X-Enigmail-Supports: pgp-inline, pgp-mime
 Content-Type: text/plain; charset=us-ascii; format=flowed
 Content-Transfer-Encoding: 7bit
 X-Virus-Scanned: Symantec AntiVirus Scan Engine
 Sender: owner-x
 Precedence: bulk
 Errors-To: [EMAIL PROTECTED]
 X-Loop: nanog
 
 
 
 Hi there,
 
 
 Just wondering if anyone out there has either implemented or looked into
 
 this queuing method for quality of service implementation.
 This solution is offered (hardware solution) and patented by
 foursticks.com. According to foursticks, HCQ achieves the efficiency
 and flexibility of first generation queuing systems, without the
 disadvantages.
 
 It compares HCQ (interesting reading) w/ Class-Based Queuing (CBQ),
 Random Early Discard (RED) and Weighted Random Early Discard
 (WRED),Weighted Fair Queuing (WFQ),Priority Queuing (PQ)  Low Latency
 Queuing (LLQ).
 
 
 

MightAnyone from swbell on the list? - large name scanning from your DSL

2004-05-11 Thread Nicole


 Well as the subject says.. 4 various mail servers (4 very different
companies) are being heavily name guessing scanned via various machines on the 
xxx.dsl.rcsntx.swbell.net network. 

 Been going on for a few days now. All from within this block and loads of it.
 Reported it but no response.




  Nicole
 


--
 |\ __ /|   (`\
 | o_o  |__  ) )   
//  \\ 
  -  [EMAIL PROTECTED]  -  Powered by FreeBSD  -
--
 The term daemons is a Judeo-Christian pejorative.
 Such processes will now be known as spiritual guides
  -Politicaly Correct UNIX Page

 http://www.nonsenseband.com

*** Spam Sucks and I get tons of it. So I have some tight spam filters.
 If any email to me bounces, please use your secret decoder ring
 and send to blabgoo at yahoo dot. com  :)



Re: Spamcop

2004-05-11 Thread Guðbjörn S . Hreinsson

 . There have been no reminders from
  the mailing list since I signed up which I think is a good policy for a
  mailing list. The mailing list only uses Precedence: bulk to mark it
as
  a mailing list.

 the list is pretty active, so i would dare say that reminders are
 superfluous. an iq test at subscription time would probably work better to
 prevent situations like this in the future.

Right, the reminder may have no value for the intended recipient which is
the
one that signed up. However, in the case of an inherited email address this
may
be valuable.

But an IQ test would be nice. What should be the I to test for?


Rgds,
-GSH



Re: Spamcop

2004-05-11 Thread Valdis . Kletnieks
On Tue, 11 May 2004 21:23:55 -, =?iso-8859-1?Q?Gu=F0bj=F6rn_S._Hreinsson?= 
[EMAIL PROTECTED]  said:
 But an IQ test would be nice. What should be the I to test for?

http://ars.userfriendly.org/cartoons/?id=19991114mode=classic


pgp0.pgp
Description: PGP signature


Re: Spamcop

2004-05-11 Thread Chris Brenton

On Tue, 2004-05-11 at 16:35, Guðbjörn S. Hreinsson wrote:

 Possible someone on the list didn't understand the content, didn't 
 realize this was sent via a mailing lists and submitted this as a spam 
 message to SPAMCOP. Less likely someone didn't know how to 
 get off the mailing list and this was the result. 
 
 In both cases the submitter exercised bad judgement. But the mailing 
 list could be more helpful as well.

Further, Spamcop should implement some form of check to verify that the
e-mail is in fact spam before they go pointing the finger and/or
blocking mail servers. The problem of end users leveraging Spamcop to
get them off of mailing lists or a simple way of DoSsing a discussion
forum would become mute if some form of sanity checking was in place.

Cheers,
Chris




Re: Spamcop

2004-05-11 Thread Laurence F. Sheldon, Jr.
Chris Brenton wrote:


Further, Spamcop should implement some form of check to verify that the
e-mail is in fact spam before they go pointing the finger and/or
blocking mail servers. The problem of end users leveraging Spamcop to
get them off of mailing lists or a simple way of DoSsing a discussion
forum would become mute if some form of sanity checking was in place.
As an ex-admin, I have some serious issues about the way Spamcop
works, but this argument is similar to one that says a credit reporting
company has to prove that you are a deadbeat before reporting that
several companies you do business with report that you are late with
payments a lot.
And as an ex-admin that had some contact with mailing lists and their
operation and managment I will say that the notion that people forgot
that they subscribed to a list does not happen nearly as often as it
is used to wriggle out from under a spam complaint.
--
Requiescas in pace o email
Ex turpi causa non oritur actio

http://members.cox.net/larrysheldon/




Re: Spamcop

2004-05-11 Thread Chris Brenton

On Tue, 2004-05-11 at 18:15, Laurence F. Sheldon, Jr. wrote:

 As an ex-admin, I have some serious issues about the way Spamcop
 works, but this argument is similar to one that says a credit reporting
 company has to prove that you are a deadbeat before reporting that
 several companies you do business with report that you are late with
 payments a lot.

I would agree with your analogy if Spamcop limited automatic reporting
to subset of the community. The problem is they do not. I can't call up
a credit agency and get them to automatically red mark your credit
report. I obviously can send pretty much anything to Spamcop, claim you
are a spammer and get them to act on that.

Cheers,
Chris




Re: Spamcop

2004-05-11 Thread Laurence F. Sheldon, Jr.
Chris Brenton wrote:

On Tue, 2004-05-11 at 18:15, Laurence F. Sheldon, Jr. wrote:

As an ex-admin, I have some serious issues about the way Spamcop
works, but this argument is similar to one that says a credit reporting
company has to prove that you are a deadbeat before reporting that
several companies you do business with report that you are late with
payments a lot.
I would agree with your analogy if Spamcop limited automatic reporting
to subset of the community. The problem is they do not. I can't call up
a credit agency and get them to automatically red mark your credit
report. I obviously can send pretty much anything to Spamcop, claim you
are a spammer and get them to act on that.
Actually, apparently you can--we have to (actually, my dear wife has to)
take the reporting houses to task every now and again because they
report, on occasion, that we are somehow connected to people who
have financial difficulty.  Sometimes it is people we know, but have
no responsibility for, sometimes it is people whose account numbers
are related numerically to ours, sometimes we never find out how they
got on our report.
And the act on that means report that you reported it--with your
privacy protected doesn't it?
--
Requiescas in pace o email
Ex turpi causa non oritur actio

http://members.cox.net/larrysheldon/




Cisco's Statement about IPR Claimed in draft-ietf-tcpm-tcpsecure

2004-05-11 Thread David Krause

Looks like Cisco is now trying to patent security

http://www.ietf.org/ietf/IPR/cisco-ipr-draft-ietf-tcpm-tcpsecure.txt

Title: Cisco's Statement about IPR Claimed in draft-ietf-tcpm-tcpsecure
Received: April 26, 2004
From: Robert Barr [EMAIL PROTECTED]

Cisco is the owner of one or more pending patent applications relating to
the subject matter of Transmission Control Protocol security
considerations draft-ietf-tcpm-tcpsecure-00.txt. If technology in this
document is included in a standard adopted by IETF and any claims of any
Cisco patents are necessary for practicing the standard, any party will be
able to obtain a license from Cisco to use any such patent claims under
reasonable, non-discriminatory terms, with reciprocity, to implement and
fully comply with the standard.

For information contact:

Robert Barr
Worldwide Patent Counsel
Cisco Systems
408-525-9706

[EMAIL PROTECTED]


Re: WAN transfer rates

2004-05-11 Thread Eric Kuhnke
It's worth mentioning that this proj.sunet.se/LSR2 test was done using 
the previous generation of Intel 10Gb PCI-X NICs, the new ones were 
announced last week:

http://www.intel.com/network/connectivity/products/pro10GbE_SR_server_adapter.htm

It uses the same controller ASIC, but is half the length and has XPAK 
optics.

Interesting stuff regarding the 82597EX 10Gb NIC controller chip and Linux:

http://www.google.com/search?q=82597EX+Linuxsourceid=mozilla-searchstart=0start=0ie=utf-8oe=utf-8

Peter Lothberg wrote:

TCP is mostly a implemenation/parameter setting problem for resonable
speeds, for high_speed, you can not drop packets.
Have a look at proj.sunet.se/LSR2.

2 $1500 mail_order PC's, 40 router hops, almost around half of
the earth.
-Peter





Re: WAN transfer rates

2004-05-11 Thread Bora Akyol
I think the real answer is more complex, if I remember this correctly:

The real transfer results depend on a lot of things, but the foremost
parameter that dominates the transfer rates for a single TCP session is
the duration of the session. If the session is short-lived, regardless 
of what the maximum window size is, the transfer rate will be abysmal 
unless the TCP stack is modified to guesstimate the initial window.

For long lived TCP sessions, you want to have enough packets in flight 
to fill the bandwidth delay product of the link to get the maximum 
throughput.

Mark Allman, Sally Floyd, and quite a few other people have published 
numerous papers on this topic.

Essentially the answer is that the transfer rates diminish with 
increasing latency if and only if the sessions are short-lived.
This becomes a huge problem especially on high bandwidth satellite links 
where some real interesting TCP hacks are employed. Now add a DNS 
lookup or two to the beginning of the sessions and things really start
to look bad for short-duration traffic over high latency links.

When you have many TCP sessions competing for the same link, then things 
start to look up.

Regards,

Bora Akyol


On 11-mei-04, at 10:24, Jeff Nelson wrote:

I realize that transfer rates across the Internet diminish significantly
with latency, but what's the good answer for someone shrunk down to
10Mbps when the smallest pipe between them is 100Mbps and latency is
40ms?




Re: Spamcop

2004-05-11 Thread chuck goolsbee

I would agree with your analogy if Spamcop limited automatic reporting
to subset of the community. The problem is they do not.
In Spamcop's defence, it seems that their systems were never designed 
to handle the wide variety of 'attack vectors that spam uses today.

Spamcop also operates on the assumption that the user is exercising 
some judgement when *directly* reporting spam, which is universally 
the case with mailing list traffic. No matter how foolproof your 
system, the world creates a better fool.

Thankfully, all my interactions - as a web host, network operator, 
and mailing list manager- with Spamcop and their staff have been 
professional,  and productive. I for one appreciate the just the 
facts style of reporting, and useful mechanisms for interacting with 
the complainers. It is a refreshing change from the usual ALL-CAPS 
threats and exclamation point filled diatribes, usually mailed to the 
wrong [EMAIL PROTECTED] addresses.

--chuck




Re: Cisco's Statement about IPR Claimed in draft-ietf-tcpm-tcpsecure

2004-05-11 Thread Tony Li


What's very amusing is reading section 5 of the draft, wherein the 
author
distributes credit to a number of parties.  If Cisco were to file a 
patent
at this point and not include those parties (including other companies),
the patent validity would be at risk by reason of excluding a 
contributor.
If Cisco does include all of those other companies in the patent, then 
all of
them must also present the IETF with relevant IPR statements.

Frankly, this is yet another PR blunder by Cisco.  If they had simply 
said
nothing or formally put their contribution into the public domain, they 
wouldn't
look so egregiously greedy.

Tony

On May 11, 2004, at 3:46 PM, David Krause wrote:

Looks like Cisco is now trying to patent security

http://www.ietf.org/ietf/IPR/cisco-ipr-draft-ietf-tcpm-tcpsecure.txt

Title: Cisco's Statement about IPR Claimed in draft-ietf-tcpm-tcpsecure
Received: April 26, 2004
From: Robert Barr [EMAIL PROTECTED]
Cisco is the owner of one or more pending patent applications relating 
to
the subject matter of Transmission Control Protocol security
considerations draft-ietf-tcpm-tcpsecure-00.txt. If technology in 
this
document is included in a standard adopted by IETF and any claims of 
any
Cisco patents are necessary for practicing the standard, any party 
will be
able to obtain a license from Cisco to use any such patent claims under
reasonable, non-discriminatory terms, with reciprocity, to implement 
and
fully comply with the standard.

For information contact:

Robert Barr
Worldwide Patent Counsel
Cisco Systems
408-525-9706
[EMAIL PROTECTED]




Announcing BGPlay - A Tool Hosted By the RIPE NCC that Visualises BGP Updates

2004-05-11 Thread Matthew Williams

 
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Dear All,

The Roma Tre University Computer Networks Research Group and the RIPE
NCC are pleased to announce BGPlay, a new beta tool that can
visualise BGP updates in the Routing Information Service's (RIS)
database. Its animated, interactive graphical display makes it easier
to interpret how BGP updates affect the routing of a specific prefix
than by analysing the updates themselves. For an idea of what BGPlay
can do, please visit the BGPlay web page at:

http://www.ris.ripe.net/bgplay/ 

and click on the screenshot for an interactive help page.

BGPlay was developed by the Computer Networks Research Group at Roma
Tre University, and is hosted by the RIPE NCC, who provide direct
access to the RIS database.

Links to Respective Groups:
* RIPE NCC Routing Information Service:  http://www.ripe.net/ris/
* Roma Tre Computer Networks research Group:
http://www.dia.uniroma3.it/~compunet/

Please note that BGPlay requires the Java browser plug-in version 1.4
or above (you can download it at http://www.java.com/en/download/ if
you don't have it). If you have the Java plug-in installed, click on
one of the links below for examples of BGPlay in action:

1. I.Net adds a new upstream:

http://www.ris.ripe.net/cgi-bin/bgplay.cgi?prefix=194.185.0.0/16start
=2004-04-08+14:02end=2004-04-08+14:04


2. Deutsche Telekom starts announcing a new network:

http://www.ris.ripe.net/cgi-bin/bgplay.cgi?prefix=84.128.0.0/11start=
2004-03-16+08:07end=2004-03-16+08:10


3. A local instance of F root is leaked globally:

http://www.ris.ripe.net/cgi-bin/bgplay.cgi?prefix=192.5.5.0/24start=2
004-03-17+19:30end=2004-03-18+22:00


4. An anycast prefix with multiple origin ASes:

http://www.ris.ripe.net/cgi-bin/bgplay.cgi?prefix=192.88.99.0/24start
=2004-04-01+03:00end=2004-04-01+20:00


For more information on BGPlay and to run queries of your own, visit
the BGPlay web page at http://www.ris.ripe.net/bgplay/

Please send your comments to [EMAIL PROTECTED] and [EMAIL PROTECTED]

Kind regards,

Roma Tre University Computer Networks Research Group  the RIS Team
at RIPE NCC


 ---
 Matthew Williams (MW243-RIPE)
 Customer Liaison Engineer
 RIPE NCC - http://www.ripe.net/np/

-BEGIN PGP SIGNATURE-
Version: PGP 7.0.4

iQA/AwUBQKFudcHkFbJe+GdoEQKw+wCgtKBk1x7u243SphgxdF7ozyhqYRAAoLAw
6F+ERBNpTJyWGH0Voo0qggzF
=RzQH
-END PGP SIGNATURE-



Re: Spamcop

2004-05-11 Thread Suresh Ramasubramanian
Vicky Rode  writes on 5/12/2004 12:21 AM:

Just wondering why was my e-mail thread (Hierarchical Credit-based 
Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just 
That question is best asked of the admin of widowmaker.com, a user of 
which reported your nanog post to spamcop.

Received: from [198.108.1.26] (helo=trapdoor.merit.edu)
by wilma.widomaker.com with esmtp (Exim 3.36 #1)
id 1BN2ZP-000Jo6-00
for x; Mon, 10 May 2004 00:39:15 -0400
	srs

--
suresh ramasubramanian [EMAIL PROTECTED] gpg EDEDEFB9
manager, security and antispam operations, outblaze ltd


WAN transfer rates

2004-05-11 Thread Jeff Nelson

Possibly someone in this forum with a better understanding of tcp/ip can
articulate this better than I

I realize that transfer rates across the Internet diminish significantly
with latency, but what's the good answer for someone shrunk down to
10Mbps when the smallest pipe between them is 100Mbps and latency is
40ms?

Does anyone have reference to any study done in this area? I'm sure
window tuning can alter this, but I'm interested in average statistics.

Any reference would be appreciated.

thanks,
jeff





Telco alarm structured cabling standard?

2004-05-11 Thread Glen Turner


Hi folks,

I want to run NEBS alarm relay signals via structured cabling.

Does anyone have a reference to a standard or know of the typical
assignment of signals to wires?

Ta,
Glen

-- 
Glen Turner Tel: (08) 8303 3936 or +61 8 8303 3936 
Australian Academic  Research Network   www.aarnet.edu.au



Re: WAN transfer rates

2004-05-11 Thread sthaug

 I realize that transfer rates across the Internet diminish significantly
 with latency, but what's the good answer for someone shrunk down to
 10Mbps when the smallest pipe between them is 100Mbps and latency is
 40ms?

Without window scaling (RFC 1323) your max transfer rate at 40ms RTT is

65535*8/0.040 = 13.1 Mbps. So slightly less than 10 Mbps isn't too
unexpected.

Steinar Haug, Nethelp consulting, [EMAIL PROTECTED]


Re: IPv6/IPv6 threat Comparison Paper available for review

2004-05-11 Thread Iljitsch van Beijnum
On 11-mei-04, at 3:13, Darrin Miller wrote:

http://www.cisco.com/security_services/ciag/documents/v6-v4-threats.pdf
Ok, some comments:

- style:

Font too small / lines too long: 15 words or more per line doesn't make 
for the easiest reading. There is way too much in the way of This 
section outlines Guess what, that's why they invented headings. As 
they say in Hollywood: cut to the chase. Six level deep heading 
numbering is also not good.

- ICMP:

The whole bit on ICMP meanders between being just strict and being too 
strict. I don't see any convincing reason to filter ICMP. But given 
that some people want this, give them the right information. Stuff like 
echo / echo reply I can live without, but I really need my PMTUD in 
IPv4 as well as IPv6. Yes, fragmentation is possible in IPv4 in theory, 
but in practice the DF bit is set on most packets. In reasonable ICMP 
filtering you should also allow more unreachables, such as port 
unreachables, or be prepared to sit through lengthy timeouts.

- On-link/off-link

Many things that are mentioned, such as the potential for multicast 
mischief, or the additional uses for ICMP, really only apply on the 
local link, and are irrelevant elsewhere on the net. The assumption 
that there is a firewall on local links is bizarre. If you want to 
protect systems against on-link misbehavior, it makes sense to put them 
behind a router. IPv6 hosts are much more vulnerable to abuse from 
on-link attackers: these can spoof neighbor/router discovery, they can 
easily find addresses and even hosts without global IPv6 addresses are 
potentially vulnerable, especially as many filters only look at IPv4 
and not IPv6. (In FreeBSD turning off IPv6 in the configuration doesn't 
actually turn it off so the host remains potentially vulnerable.)

- Fragmentation

You can't drop non-last fragments that are smaller than 1280 bytes as a 
host may fragment a packet into equal size parts rather than a big and 
a small part. Testing if you can get away with it makes no sense as new 
implementations come on the market all the time. If you want to do this 
you can probably do it at around ~600 bytes for non-last fragments as 
there is no legitimate need to fragment packets that are already 1280 
bytes or smaller, so if this is done anyway it's probably for reasons 
you don't like.

- Smurf

I don't think you mention that in IPv6, there are no mechanisms that 
allow an incoming unicast packet to be turned into a broadcast or 
multicast packet, and as such, smurf-like attacks are impossible.

- Tunneling

Why only filter outbound tunneling?

- Use of multiple addresses

You say that RFC 3041 helps against scanning. It doesn't, as hosts also 
keep their EUI-64 derived addresses. In IPv6 it is required to support 
having multiple addresses on an interface.



Re: WAN transfer rates

2004-05-11 Thread Iljitsch van Beijnum
On 11-mei-04, at 10:24, Jeff Nelson wrote:

I realize that transfer rates across the Internet diminish 
significantly
with latency, but what's the good answer for someone shrunk down to
10Mbps when the smallest pipe between them is 100Mbps and latency is
40ms?

Does anyone have reference to any study done in this area? I'm sure
window tuning can alter this, but I'm interested in average statistics.
The best you can do is transfer a window size per round trip. You can 
see the window size with tcpdump or one of its cousins, and looking at 
netstat output will get you somewhere in the neighborhood too. So if 
your window is 16k and your RTT 25 ms, that's 16k every 25 ms. Or 16 * 
1000 / 25 = 640k per second = 64 * 8 = 5 Mbps.



Re: IPv6/IPv6 threat Comparison Paper available for review

2004-05-11 Thread Iljitsch van Beijnum
On 11-mei-04, at 11:19, [EMAIL PROTECTED] wrote:

- Smurf

I don't think you mention that in IPv6, there are no mechanisms that
allow an incoming unicast packet to be turned into a broadcast or
multicast packet, and as such, smurf-like attacks are impossible.

There are cases where malicious IPv6 packet leads to IPv4 smurf
attack (due to wacky IPv4 mapped address and API).
i think it worthwhile to look at threats due to IPv4/v6 interaction.
You can obviously craft an IPv6 packet that will be delivered to an 
IPv4 subnet broadcast address through 6to4 or some such, but unless the 
hosts that receive the subsequent broadcast (that shouldn't be 
generated unless v4 isn't properly administered in the first place so 
it's still not an IPv6 issue) reply with something, nothing is going to 
happen.

draft-itojun-ipv6-transition-abuse-xx.txt
draft-cmetz-v6ops-v4mapped-api-harmful-xx.txt
draft-itojun-v6ops-v4mapped-harmful-xx.txt
Yeah, yeah, everything is harmful. I don't think having IPv4-specific 
and IPv6-specific code in applications is the answer, though.



Re: WAN transfer rates

2004-05-11 Thread Vincent J. Bono

A nifty graph that I have found to be fairly accurate is at a little way
down the page.

http://www.atlantateleport.com/Services/TCP_IP_Via_Satellite/tcp_ip_via_satellite.htm

And an intensive whitepaper at:

http://public.lanl.gov/radiant/pubs/drs/hpdc2002.pdf


Hope this helps.

-v



 - Original Message - 
 From: Jeff Nelson [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Sent: Tuesday, May 11, 2004 4:24 AM
 Subject: WAN transfer rates


 
  Possibly someone in this forum with a better understanding of tcp/ip can
  articulate this better than I
 
  I realize that transfer rates across the Internet diminish significantly
  with latency, but what's the good answer for someone shrunk down to
  10Mbps when the smallest pipe between them is 100Mbps and latency is
  40ms?
 
  Does anyone have reference to any study done in this area? I'm sure
  window tuning can alter this, but I'm interested in average statistics.
 
  Any reference would be appreciated.
 
  thanks,
  jeff
 
 
 




Re: WAN transfer rates

2004-05-11 Thread Peter Lothberg

TCP is mostly a implemenation/parameter setting problem for resonable
speeds, for high_speed, you can not drop packets.

Have a look at proj.sunet.se/LSR2.

2 $1500 mail_order PC's, 40 router hops, almost around half of
the earth.

-Peter


Re: Worms versus Bots

2004-05-11 Thread Chris Woodfield
I think running two separate computers is a wee bit of overkill...

A better solution would be a NIC with a built-in SI firewall...manageable from a host 
app, but physically separate from the OS running on the PC.

-C

On Thu, May 06, 2004 at 09:49:37PM +0300, Petri Helenius wrote:
 
 [EMAIL PROTECTED] wrote:
 
 
 you can easily fit an entire router into a PC's slimline
 case and the router can include a complete SI Firewall
 capability. The PC BIOS will allow the initial SI Firewall
 config to be done before booting the PC.
  
 
 
 They got to it before you did; http://www.giwano.com/
 
 Pete
 


pgp0.pgp
Description: PGP signature


Re: Worms versus Bots

2004-05-11 Thread Valdis . Kletnieks
On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:

 A better solution would be a NIC with a built-in SI firewall...manageable from a host
 app, but physically separate from the OS running on the PC.

Gaak.  No. ;)

What's the point of a firewall, if the first piece of malware that does manage
to sneak in (via a file-sharing program, or a webpage that installs malware, or
an ooh! Shiny! email attachment) just does the network Plug-N-Play call to
tell the firewall Shield DOWN!?



pgp0.pgp
Description: PGP signature


Re: Worms versus Bots

2004-05-11 Thread Chris Woodfield
Simple solution...build the on-NIC firewall to not use uPnP, or at least require 
a password before changing rulesets. :)

Seriously, this is such a stupidly simple solution that I'm amazed no one's attempted 
to make a product out of it yet. 

-C

On Tue, May 11, 2004 at 12:21:29PM -0400, [EMAIL PROTECTED] wrote:
 On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:
 
  A better solution would be a NIC with a built-in SI firewall...manageable from a 
  host
  app, but physically separate from the OS running on the PC.
 
 Gaak.  No. ;)
 
 What's the point of a firewall, if the first piece of malware that does manage
 to sneak in (via a file-sharing program, or a webpage that installs malware, or
 an ooh! Shiny! email attachment) just does the network Plug-N-Play call to
 tell the firewall Shield DOWN!?
 




pgp0.pgp
Description: PGP signature


RE: Worms versus Bots

2004-05-11 Thread Jonathan M. Slivko

Uh... they have. It's called a Snapgear card :)
-- Jonathan

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Chris Woodfield
Sent: Tuesday, May 11, 2004 12:42 PM
To: [EMAIL PROTECTED]
Cc: Petri Helenius; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Worms versus Bots

Simple solution...build the on-NIC firewall to not use uPnP, or at least
require 
a password before changing rulesets. :)

Seriously, this is such a stupidly simple solution that I'm amazed no one's
attempted 
to make a product out of it yet. 

-C

On Tue, May 11, 2004 at 12:21:29PM -0400, [EMAIL PROTECTED] wrote:
 On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:
 
  A better solution would be a NIC with a built-in SI
firewall...manageable from a host
  app, but physically separate from the OS running on the PC.
 
 Gaak.  No. ;)
 
 What's the point of a firewall, if the first piece of malware that does
manage
 to sneak in (via a file-sharing program, or a webpage that installs
malware, or
 an ooh! Shiny! email attachment) just does the network Plug-N-Play call
to
 tell the firewall Shield DOWN!?
 





Re: Worms versus Bots

2004-05-11 Thread Rick Ernst


While following the thread, I did a bit of Googling, then browsing 3Com's
site:

http://www.3com.com/products/en_US/detail.jsp?tab=featurespathtype=purchasesku=3CRFW200B

On-NIC firewall w/remote management.


On Tue, 11 May 2004, Chris Woodfield wrote:

:Simple solution...build the on-NIC firewall to not use uPnP, or at least require
:a password before changing rulesets. :)
:
:Seriously, this is such a stupidly simple solution that I'm amazed no one's attempted
:to make a product out of it yet.
:
:-C
:
:On Tue, May 11, 2004 at 12:21:29PM -0400, [EMAIL PROTECTED] wrote:
: On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:
:
:  A better solution would be a NIC with a built-in SI firewall...manageable from a 
host
:  app, but physically separate from the OS running on the PC.
:
: Gaak.  No. ;)
:
: What's the point of a firewall, if the first piece of malware that does manage
: to sneak in (via a file-sharing program, or a webpage that installs malware, or
: an ooh! Shiny! email attachment) just does the network Plug-N-Play call to
: tell the firewall Shield DOWN!?
:
:
:
:



Re: Worms versus Bots

2004-05-11 Thread Chris Woodfield
I stand corrected, they're out there. I'm advised that 3com has a on-NIC firewall 
product as well.

However, at $299 and $329 respectively, I don't anticipate wide adoption in the 
consumer market...

-C

On Tue, May 11, 2004 at 12:49:05PM -0400, Jonathan M. Slivko wrote:
 
 Uh... they have. It's called a Snapgear card :)
 -- Jonathan
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 Chris Woodfield
 Sent: Tuesday, May 11, 2004 12:42 PM
 To: [EMAIL PROTECTED]
 Cc: Petri Helenius; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: Re: Worms versus Bots
 
 Simple solution...build the on-NIC firewall to not use uPnP, or at least
 require 
 a password before changing rulesets. :)
 
 Seriously, this is such a stupidly simple solution that I'm amazed no one's
 attempted 
 to make a product out of it yet. 
 
 -C
 
 On Tue, May 11, 2004 at 12:21:29PM -0400, [EMAIL PROTECTED] wrote:
  On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:
  
   A better solution would be a NIC with a built-in SI
 firewall...manageable from a host
   app, but physically separate from the OS running on the PC.
  
  Gaak.  No. ;)
  
  What's the point of a firewall, if the first piece of malware that does
 manage
  to sneak in (via a file-sharing program, or a webpage that installs
 malware, or
  an ooh! Shiny! email attachment) just does the network Plug-N-Play call
 to
  tell the firewall Shield DOWN!?
  
 
 
 


pgp0.pgp
Description: PGP signature


Spamcop

2004-05-11 Thread Vicky Rode
Hi there,

Just wondering why was my e-mail thread (Hierarchical Credit-based 
Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just 
trying to understand so that I don't repeat it. Below is a cut and paste 
of the reported incident.

Please advice.

regards,
/vicky
 cut here --

Return-Path: [EMAIL PROTECTED]
Received: from vamx01.mgw.rr.com ([24.28.193.148]) by
acme-reston.va.rr.com
  (Post.Office MTA v3.5.3 release 223
  ID# 0-59787U25L25S0V35) with SMTP id com
  for [EMAIL PROTECTED]; Mon, 10 May 2004 10:42:14 -0400
Received: from vmx2.spamcop.net (vmx2.spamcop.net [206.14.107.117])
by vamx01.mgw.rr.com (8.12.10/8.12.8) with ESMTP id
i4AEkwhn017175
for [EMAIL PROTECTED]; Mon, 10 May 2004 10:47:01 -0400 (EDT)
Received: from sc-app3.verio.ironport.com (HELO spamcop.net)
(192.168.11.203)
  by vmx2.spamcop.net with SMTP; 10 May 2004 07:47:00 -0700
Received: from [68.13.211.63] by spamcop.net
with HTTP; Mon, 10 May 2004 14:47:01 GMT
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [SpamCop (24.30.181.126) id:988145978]Hierarchical Credit-based
Queuing (HCQ): QoS
Precedence: list
Message-ID: [EMAIL PROTECTED]
Date: Sun, 9 May 2004 21:36:30 -0700 (PDT)
X-SpamCop-sourceip: 24.30.181.126
X-Mailer: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR
1.0.3705)
via http://www.spamcop.net/ v1.3.4
X-Virus-Scanned: Symantec AntiVirus Scan Engine
[ SpamCop V1.3.4 ]
This message is brief for your comfort.  Please use links below for
details.
Email from 24.30.181.126 / Sun, 9 May 2004 21:36:30 -0700 (PDT)
http://www.spamcop.net/w3m?i=z988145978zab5cec781dcfa15ae459c11bd03b7bef
z
[ Offending message ]
Return-path: owner-x
Envelope-to: x
Delivery-date: Mon, 10 May 2004 00:39:15 -0400
Received: from [198.108.1.26] (helo=trapdoor.merit.edu)
by wilma.widomaker.com with esmtp (Exim 3.36 #1)
id 1BN2ZP-000Jo6-00
for x; Mon, 10 May 2004 00:39:15 -0400
Received: by trapdoor.merit.edu (Postfix)
id B68EC91206; Mon, 10 May 2004 00:36:37 -0400 (EDT)
Delivered-To: x
Received: by trapdoor.merit.edu (Postfix, from userid 56)
id 8645591243; Mon, 10 May 2004 00:36:37 -0400 (EDT)
Delivered-To: x
Received: from segue.merit.edu (segue.merit.edu [198.108.1.41])
by trapdoor.merit.edu (Postfix) with ESMTP id 50AFD91206
for x; Mon, 10 May 2004 00:36:34 -0400 (EDT)
Received: by segue.merit.edu (Postfix)
id 3B3955914F; Mon, 10 May 2004 00:36:34 -0400 (EDT)
Delivered-To: x
Received: from ms-smtp-02-eri0.socal.rr.com
(ms-smtp-02-qfe0.socal.rr.com [66.75.162.134])
by segue.merit.edu (Postfix) with ESMTP id EAB7358E5D
for x; Mon, 10 May 2004 00:36:33 -0400 (EDT)
Received: from [192.168.2.2] (cpe-24-30-181-126.socal.rr.com
[24.30.181.126])
by ms-smtp-02-eri0.socal.rr.com (8.12.10/8.12.7) with ESMTP id
i4A4aUce025659
for x; Sun, 9 May 2004 21:36:30 -0700 (PDT)
Message-ID: [EMAIL PROTECTED]
Date: Sun, 09 May 2004 21:36:41 -0700
From: Vicky Rode [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
User-Agent: Mozilla Thunderbird 0.6 (Windows/20040502)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: x
Subject: Hierarchical Credit-based Queuing (HCQ): QoS
X-Enigmail-Version: 0.83.6.0
X-Enigmail-Supports: pgp-inline, pgp-mime
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: Symantec AntiVirus Scan Engine
Sender: owner-x
Precedence: bulk
Errors-To: [EMAIL PROTECTED]
X-Loop: nanog


Hi there,

Just wondering if anyone out there has either implemented or looked into

this queuing method for quality of service implementation.
This solution is offered (hardware solution) and patented by
foursticks.com. According to foursticks, HCQ achieves the efficiency
and flexibility of first generation queuing systems, without the
disadvantages.
It compares HCQ (interesting reading) w/ Class-Based Queuing (CBQ),
Random Early Discard (RED) and Weighted Random Early Discard
(WRED),Weighted Fair Queuing (WFQ),Priority Queuing (PQ)  Low Latency
Queuing (LLQ).
Also can anyone recommend a qos forum which I can ping as well.

Any insight will be appreciated.

regards,
/vicky



Re: Spamcop

2004-05-11 Thread Gregory Hicks


 Date: Tue, 11 May 2004 11:51:10 -0700
 From: Vicky Rode [EMAIL PROTECTED]
 To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
 Subject: Spamcop
 
 
 Hi there,
 
 Just wondering why was my e-mail thread (Hierarchical Credit-based 
 Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just 
 trying to understand so that I don't repeat it. Below is a cut and paste 
 of the reported incident.

Vicky:

I'm guessing here, but it was probably because the *.rr.com addresses
originate a LOT of spam and someone has a procmail filter that
automatically refers any mail from that domain to spamcop...

Or it could be that someone didn't like what you wrote and reported it
...

Dunno.

Remember, I said that I'm **guessing**.

Regards,
Gregory Hicks

 
 
 Please advice.
 
 
 regards,
 /vicky
 
 
  cut here --
 
 Return-Path: [EMAIL PROTECTED]
 Received: from vamx01.mgw.rr.com ([24.28.193.148]) by
 acme-reston.va.rr.com
(Post.Office MTA v3.5.3 release 223
ID# 0-59787U25L25S0V35) with SMTP id com
for [EMAIL PROTECTED]; Mon, 10 May 2004 10:42:14 -0400
 Received: from vmx2.spamcop.net (vmx2.spamcop.net [206.14.107.117])
   by vamx01.mgw.rr.com (8.12.10/8.12.8) with ESMTP id
 i4AEkwhn017175
   for [EMAIL PROTECTED]; Mon, 10 May 2004 10:47:01 -0400 (EDT)
 Received: from sc-app3.verio.ironport.com (HELO spamcop.net)
 (192.168.11.203)
by vmx2.spamcop.net with SMTP; 10 May 2004 07:47:00 -0700
 Received: from [68.13.211.63] by spamcop.net
   with HTTP; Mon, 10 May 2004 14:47:01 GMT
 From: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: [SpamCop (24.30.181.126) id:988145978]Hierarchical Credit-based
 Queuing (HCQ): QoS
 Precedence: list
 Message-ID: [EMAIL PROTECTED]
 Date: Sun, 9 May 2004 21:36:30 -0700 (PDT)
 X-SpamCop-sourceip: 24.30.181.126
 X-Mailer: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR
 1.0.3705)
   via http://www.spamcop.net/ v1.3.4
 X-Virus-Scanned: Symantec AntiVirus Scan Engine
 
 [ SpamCop V1.3.4 ]
 This message is brief for your comfort.  Please use links below for
 details.
 
 Email from 24.30.181.126 / Sun, 9 May 2004 21:36:30 -0700 (PDT)
 http://www.spamcop.net/w3m?i=z988145978zab5cec781dcfa15ae459c11bd03b7bef
 z
 
 [ Offending message ]
 Return-path: owner-x
 Envelope-to: x
 Delivery-date: Mon, 10 May 2004 00:39:15 -0400
 Received: from [198.108.1.26] (helo=trapdoor.merit.edu)
   by wilma.widomaker.com with esmtp (Exim 3.36 #1)
   id 1BN2ZP-000Jo6-00
   for x; Mon, 10 May 2004 00:39:15 -0400
 Received: by trapdoor.merit.edu (Postfix)
   id B68EC91206; Mon, 10 May 2004 00:36:37 -0400 (EDT)
 Delivered-To: x
 Received: by trapdoor.merit.edu (Postfix, from userid 56)
   id 8645591243; Mon, 10 May 2004 00:36:37 -0400 (EDT)
 Delivered-To: x
 Received: from segue.merit.edu (segue.merit.edu [198.108.1.41])
   by trapdoor.merit.edu (Postfix) with ESMTP id 50AFD91206
   for x; Mon, 10 May 2004 00:36:34 -0400 (EDT)
 Received: by segue.merit.edu (Postfix)
   id 3B3955914F; Mon, 10 May 2004 00:36:34 -0400 (EDT)
 Delivered-To: x
 Received: from ms-smtp-02-eri0.socal.rr.com
 (ms-smtp-02-qfe0.socal.rr.com [66.75.162.134])
   by segue.merit.edu (Postfix) with ESMTP id EAB7358E5D
   for x; Mon, 10 May 2004 00:36:33 -0400 (EDT)
 Received: from [192.168.2.2] (cpe-24-30-181-126.socal.rr.com
 [24.30.181.126])
   by ms-smtp-02-eri0.socal.rr.com (8.12.10/8.12.7) with ESMTP id
 i4A4aUce025659
   for x; Sun, 9 May 2004 21:36:30 -0700 (PDT)
 Message-ID: [EMAIL PROTECTED]
 Date: Sun, 09 May 2004 21:36:41 -0700
 From: Vicky Rode [EMAIL PROTECTED]
 Reply-To: [EMAIL PROTECTED]
 User-Agent: Mozilla Thunderbird 0.6 (Windows/20040502)
 X-Accept-Language: en-us, en
 MIME-Version: 1.0
 To: x
 Subject: Hierarchical Credit-based Queuing (HCQ): QoS
 X-Enigmail-Version: 0.83.6.0
 X-Enigmail-Supports: pgp-inline, pgp-mime
 Content-Type: text/plain; charset=us-ascii; format=flowed
 Content-Transfer-Encoding: 7bit
 X-Virus-Scanned: Symantec AntiVirus Scan Engine
 Sender: owner-x
 Precedence: bulk
 Errors-To: [EMAIL PROTECTED]
 X-Loop: nanog
 
 
 
 Hi there,
 
 
 Just wondering if anyone out there has either implemented or looked into
 
 this queuing method for quality of service implementation.
 This solution is offered (hardware solution) and patented by
 foursticks.com. According to foursticks, HCQ achieves the efficiency
 and flexibility of first generation queuing systems, without the
 disadvantages.
 
 It compares HCQ (interesting reading) w/ Class-Based Queuing (CBQ),
 Random Early Discard (RED) and Weighted Random Early Discard
 (WRED),Weighted Fair Queuing (WFQ),Priority Queuing (PQ)  Low Latency
 Queuing (LLQ).
 
 
 Also can anyone recommend a qos forum which I can ping as well.
 
 
 Any insight will be appreciated.
 
 
 regards,
 /vicky
 
 

---
Gregory Hicks  

Re: Spamcop

2004-05-11 Thread Valdis . Kletnieks
On Tue, 11 May 2004 11:51:10 PDT, Vicky Rode said:

 Just wondering why was my e-mail thread (Hierarchical Credit-based 
 Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just 

My guess is that somebody's automated tool saw credit-based and
concluded that it was Yet Another Mortgage Spam...


pgp0.pgp
Description: PGP signature


Re: Spamcop

2004-05-11 Thread Jared Mauch

On Tue, May 11, 2004 at 12:00:14PM -0700, Gregory Hicks wrote:
  Just wondering why was my e-mail thread (Hierarchical Credit-based 
  Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just 
  trying to understand so that I don't repeat it. Below is a cut and paste 
  of the reported incident.
 
 Vicky:
 
 I'm guessing here, but it was probably because the *.rr.com addresses
 originate a LOT of spam and someone has a procmail filter that
 automatically refers any mail from that domain to spamcop...
 
 Or it could be that someone didn't like what you wrote and reported it
 ...

I've found that a number of people that are spamcop subscribers
report messages as spam that are not when they don't know how to
get removed from lists.

I find this annoying and always make a note in the spamcop
ticket saying they're fools when this happens.

I do wish that rr.com would get a different dns naming
system set up (ala comcast, using client.comcast.net or similar subdomain
that does not have MX records to help with the direct-to-server SMTP
problem I have with rr.com with spam..)

- Jared

-- 
Jared Mauch  | pgp key available via finger from [EMAIL PROTECTED]
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.


Re: Spamcop

2004-05-11 Thread Christopher McCrory

Hello...


On Tue, 2004-05-11 at 11:51, Vicky Rode wrote:
 Hi there,
 
 Just wondering why was my e-mail thread (Hierarchical Credit-based 
 Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just 
 trying to understand so that I don't repeat it. Below is a cut and paste 
 of the reported incident.
 
 
 Please advice.
 

I think this is a violation of the SpamCop TOS.  Somewhere in there is
says something like, Don't report stuff you asked for like mailing
lists, newsletters, etc.

I can't find the link now :(, but I remember seeing it in there
somewhere.



 
 regards,
 /vicky
 
snip


-- 
Christopher McCrory
 The guy that keeps the servers running
 
[EMAIL PROTECTED]
 http://www.pricegrabber.com
 
Let's face it, there's no Hollow Earth, no robots, and
no 'mute rays.' And even if there were, waxed paper is
no defense.  I tried it.  Only tinfoil works.



Re: Spamcop

2004-05-11 Thread Richard Welty

On Tue, 11 May 2004 12:00:14 -0700 (PDT) Gregory Hicks [EMAIL PROTECTED] wrote:
 I'm guessing here, but it was probably because the *.rr.com addresses
 originate a LOT of spam and someone has a procmail filter that
 automatically refers any mail from that domain to spamcop...

 Or it could be that someone didn't like what you wrote and reported it
 ..

 Dunno.

 Remember, I said that I'm **guessing**.

here's another guess: someone wants off of nanog, lost or didn't understand
the unsubscribe instructions and is submitting nanog email to spamcop
to try and get off.

it's a guess, but it has happened before with other lists.

richard
-- 
Richard Welty [EMAIL PROTECTED]
Averill Park Networking 518-573-7592
Java, PHP, PostgreSQL, Unix, Linux, IP Network Engineering, Security



Re: Spamcop

2004-05-11 Thread Eric Brunner-Williams

I got one of those during the Spring last year, when I was writing about
the state of the net in Iraq. Someone used SpamCop to get my ISP's abuse
desk interested in me. Not much to be said about that.



Re: Spamcop

2004-05-11 Thread JC Dill
At 12:09 PM 5/11/2004, Jared Mauch wrote:
I've found that a number of people that are spamcop subscribers
report messages as spam that are not when they don't know how to
get removed from lists.
It could also simply be a mistake.  The inet-access list was once reported 
as a spam source by a happy subscriber who was busy reporting hundreds (or 
thousands?) of spams and clicked /included a list post by accident.

jc

--

p.s.  Please do not cc me on replies to the list.  Please reply to the list 
only, or to me only (as you prefer) but not to both.