Re: RBLs in use
On 11/20/2003 at 10:51 AM, "Paul S. Brown" <[EMAIL PROTECTED]> wrote: > Nope, > Just an ISP with normal ISP type operational spam problems. I'm trying to > quantify how often we actually appear on RBL, but I want to get some idea of > how much credence to give to appearing on any given list. > For example something like the old Dorkslayers lists should be ignored because > they would blacklist you if you sneezed at the wrong time, however MAPS is > probably a good list. > P. Based on what you said in http://groups.google.com/groups?selm=bneav9%2410frig%241%40ID-169718.news.uni-berlin.de&oe=UTF-8&output=gplain you appear to be working for BT (British Telecom). BT have (quite rightly) been repeatedly blocked by DNSBL's and private lists as a result of their poor record in handling abuse incidents (whether that's by intent or negligence by way of a colossal management failure is another debate entirely). Are you looking to apply leverage internally to arrange for that situation to change, or are you (perhaps) attempting to gather information which your employer can use to harass or pursue DNSBL maintainers or other spam foes in some way?" I have several individuals privately voicing this suspicion to me, along with other wild suspicions, like: has BT hired Mark E. "Felonstein" Felstein to provide legal advice based on his impeccable experience gained in the E-Marketers of America vs. SPEWS et.al. case? (http://www.spamhaus.org/legal/index.html) bye,Kai
paging Motorola - please evacuate your ninja bots from route-views.oregon-ix.net
Paging Motorola. Please leave some system resources for the rest of us and LOG OFF when you're done. Thank you. bye,Kai sonet:~$ date Mon Nov 10 13:56:46 EST 2003 sonet:~$ telnet route-views.oregon-ix.net [] route-views.oregon-ix.net>who Line User Host(s) Idle Location 2 vty 0idle 1w3d gate01.mot.com 3 vty 1idle 1w3d gate02.mot.com 4 vty 2idle 1w3d 203.135.29.11 5 vty 3idle 1w2d www.sohoskyway.net 6 vty 4idle 1w3d mippet.ci.com.au 7 vty 5idle 1w2d a65-124-16-8.svc.towardex.com 8 vty 6idle 1w2d gate01.mot.com 9 vty 7idle 1w2d gate02.mot.com 10 vty 8idle 1w3d 216.140.58.174 11 vty 9idle 1w3d host1.tla.com 12 vty 10 idle 1w3d gate01.mot.com 13 vty 11 idle 1w2d gate02.mot.com 14 vty 12 idle 1w3d gate01.mot.com 15 vty 13 idle 1w2d gate01.mot.com 16 vty 14 idle2d19h gate02.mot.com 17 vty 15 idle 1w1d gate02.mot.com 18 vty 16 idle 1w1d gate01.mot.com 19 vty 17 idle 1w1d gate02.mot.com 20 vty 18 idle 1w1d gate01.mot.com 21 vty 19 idle 1w0d gate02.mot.com 22 vty 20 idle 1w0d gate02.mot.com 23 vty 21 idle4d10h 203.130.226.203 24 vty 22 idle5d23h gate02.mot.com 25 vty 23 idle 1w0d Blackberry.rt.ru 26 vty 24 idle 1w0d gate01.mot.com 27 vty 25 idle 1w0d gate02.mot.com 28 vty 26 idle 1w0d gate02.mot.com 29 vty 27 idle 1w0d gate01.mot.com 30 vty 28 idle6d12h gate01.mot.com 31 vty 29 idle3d18h gate02.mot.com 32 vty 30 idle3d20h office.gill.force.vcn.com 33 vty 31 idle4d16h gate02.mot.com 34 vty 32 idle6d17h gate02.mot.com 35 vty 33 idle2d13h gate02.mot.com 36 vty 34 idle5d13h 203.130.226.203 37 vty 35 idle4d22h gate01.mot.com 38 vty 36 idle2d03h phlox.cs.wisc.edu 39 vty 37 idle4d23h a207-99-126-144.svc.towardex.com 40 vty 38 idle3d15h gate01.mot.com 41 vty 39 idle3d14h gate02.mot.com 42 vty 40 idle3d06h gate02.mot.com 43 vty 41 idle4d05h gate02.mot.com 44 vty 42 idle3d17h mail-out.hk.reach.com 45 vty 43 idle3d12h gate02.mot.com 46 vty 44 idle2d15h gate02.mot.com * 47 vty 45 idle 00:00:00 sonet.conti.nu 48 vty 46 idle2d14h gate02.mot.com 49 vty 47 idle2d22h gate02.mot.com 50 vty 48 idle1d07h gate02.mot.com 51 vty 49 idle2d01h gate02.mot.com 52 vty 50 idle2d09h gate02.mot.com 53 vty 51 idle 00:00:14 ip-157-14.newcomamericas.net 54 vty 52 idle 00:04:10 office.gill.force.vcn.com 55 vty 53 idle 11:10:41 gate02.mot.com 56 vty 54 idle 00:00:34 gateway.panamsat.com 57 vty 55 idle 16:11:06 gate01.mot.com 58 vty 56 idle 01:40:51 johnnypc.csu.net 61 vty 59 idle 16:17:18 hq1.colosseum.com 62 vty 60 idle2d00h gate02.mot.com 65 vty 63 idle 09:30:35 CPE-144-136-76-220.nsw.bigpond.net.au 69 vty 67 idle 00:04:49 turing.servers.luna.net 70 vty 68 idle 00:04:52 turing.servers.luna.net 71 vty 69 idle 00:04:47 turing.servers.luna.net 72 vty 70 idle 00:04:42 turing.
Re: Finding ASN from IP address
On 10/9/2003 at 12:49 PM, "Avleen Vig" <[EMAIL PROTECTED]> wrote: > I want to create a mapping of IP addresses to ASN, for a specific like > of IP addresses. Eg: > 1.2.3.4 > 12.34.56.78 > etc, gathered from my system logs. > What is the best way of doing this? http://www.spamshield.org/#tools : ip-leecher.pl And damn you, if you don't use your own router instead of the route-servers for more than a few 100 queries per day :) bye,Kai
Re: CCO/cisco.com issues.
On Mon, 6 Oct 2003 14:01:31 -0700, Roland Dobbins wrote > Folks, > > We've been handling a multi-vector DDoS - 40-byte spoofed SYN-flooding > towards www.cisco.com (198.133.219.25/32) as well as an HTTP-AUTH > resource-exhaustion attack, and working these issues with our > upstreams. Our apologies for any inconveniences, and our thanks to > those who've assisted in tracing and blocking the spoofed traffic. > > We're continuing the work the issue, and would be grateful if > operators would check for 40-byte spoofed TCP headed towards > 198.133.219.25/32 and trace/block it as warranted. Your patience and > understanding are greatly appreciated. > > Thanks! > > - > Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 voice My mailbox has filled quite a bit (to the tune of a dozen-plus mails) with comments along the lines of "don't quote me, NANOG is too important for my work, I don't want to get on Sue Harris' bad side" since my last so-called "off-topic" NANOG post (which all but *one* person, other than Sue Harris, found to be "within range and reason"). The spammers, the DDoS'ers, the proxy scanners and rapists, the SMTP auth crackers. the trojan spreaders, the DNSBL-DOS'ers, the hardcore computer criminals are the evil army of one? The following well-remembered lines come to mind here, and excuse me if you hear a slight hysterical laughter from my direction: "First They Came for the Jews First they came for the Jews and I did not speak out because I was not a Jew. Then they came for the Communists and I did not speak out because I was not a Communist. Then they came for the trade unionists and I did not speak out because I was not a trade unionist. Then they came for me and there was no one left to speak out for me." Pastor Martin Niemöller
Re: williams spamhaus blacklist
On 9/25/2003 at 3:04 PM, "Susan Harris" <[EMAIL PROTECTED]> wrote to me: > This is the third time I've contacted you concerning violations of the > NANOG list AUP. Your message below focuses on spam/blacklists, issues > that are not considered operational and are therefore off-topic for the > list. This is your last warning - if subsequent messages violate any > terms of the NANOG list, we'll need to remove your posting privileges from > the list. > Please refer to the AUP: > http://www.nanog.org/aup.html > Susan Harris, Ph.D. > Merit Network/Univ. of Mich. (above is a template, btw) oops - too late - been busy writing the next post that is SUPPOSEDLY off topic, and I hit 'send' before seeing this one. Now tell me: why are you not posting this notice to the list to kill the thread, if that is the desired effect? bye,Kai
Re: williams spamhaus blacklist
On 9/25/2003 at 2:19 PM, "Deepak Jain" <[EMAIL PROTECTED]> wrote: >> But it's ok when AboveNet does it?...or actually does much worse by >> secretly and arbitrarily blackholing various networks at will, while >> advertising connectivity to those networks to their BGP customers and >> peers? >> > So why keep connectivity to them? A contract term? Now that you know of the > policy and aren't very happy about it, why not change providers -- you > already have a few. :) > I think anyone who blackholes sites within their own network should take the > specifics with a community that clueful customers can use to route-around > them, but obviously its their network, and whoever is setting up the > blackholes can decide that for themselves. Just a suggestion. Travis Haymore, Director of Security at AboveNet, has reportedly (see Spam-L a couple weeks back) made telephoned threats to at least one system owner (digistar.com), threatening (and then following up on that threat) to null-route that particular system (/32) on all of AboveNet/MFNX's routers, for no other reason than a user of that system making unfavorable public statements about AboveNet in public forums - while not disputing the truth of such statements made; he just wanted "that user gone, or else". Unfortunately for Travis, that happened to be the backup outgoing MX for a mailing list of quite some importance to a few ISPs and RIRs: Hijacked-L. As far as my own case is concerned, presumably the same individual null-routed the machine this mail originates from (208.241.101.2), for reasons not explained and not justified with internal documentation whatsoever (that much I got from an AboveNet manager; causing removal of this IP from their BL, for lack of documentation, and the unnamed individual responsible for its entry (Travis was never mentioned by name to me by this AboveNet person, but everyone else who has reported similar experiences with AboveNet seems to be pointing back to him at this point) never contested it). Indeed, quite a bit of mail to [EMAIL PROTECTED] has been sent from this IP (we are talking of maybe a few hundred since Jan 2003, a fraction of the number of actual incidents observed) - and that appeared to be the one and only reason why this machine would appear on his/their radar at all. Legitimate, persistent and continuing complaints about illegal trespassing originating from AboveNet's (or their customer's) IP space into your servers apparently can get you transit-blackholed at AboveNet, rather than getting yourself blocked from accessing *AboveNet OWNED AND OPERATED* machines - while AboveNet, knowingly and willingly, does nothing to stop the illegal activity by itself. If null0-routing the complainant shields that complainant from the illegal activity (in order to make him shut up), I become quite suspicious that the remaining illegal activity against the other 99.999% of the Internet is not just being ignored, but endorsed and shielded from further discovery by the complainant. That's called "collusion", in my I-am-not-a-lawyer-way of expressing this. Add the secrecy on AboveNet's side and the unusual paths it takes to even partially uncover any of this, then tell me: would you rather be SBL-listed for everyone to see, or secretly null0'd at a transit point, with no public or privately accessible record, until you randomly find out about it, because some customer-used services (websites, email, etc.) have been failing randomly for a couple of weeks (blame the Internet!) ? > This way, blackholes designed to protect clue-light customers can be used > with little detriment to clueful customers (once the communities are used > and well-described/published). Funny as it is, none of the definitions found at http://www.above.net/antispam.html (section (3) and (8)) ever seem to apply to the cases that we are hearing and reading about here, making the interception and redirection of this traffic NOT AIMED AT AboveNET quite unlawful under federal wiretapping statutes - and all of this is happening with AboveNet managers being well-aware - less the details on the legalities, I am sure. And this one is for Deepak: how exactly would a single host (e.g.: any prefix longer than a /24) evade the giant traffic vacuum cleaner (AboveNet, busy cleansing the Internet of "unwanted by anyone" packets) when your route, as seem from most of the Internet, is a /10, rather than a /22, /23 or /24? And last but not least: Infrastructure failures as a result of operator behavior are on-topic, the last time I checked. bye,Kai
Re: williams spamhaus blacklist
[at the risk of getting whacked by Sue Harris, like: what does "operational" mean anyway when the flood of criminal activity that's been the subject of discussion here in recent days is frustrating massive amounts of ordinary customers/Internet users, who will turn away from the Internet in frustration altogether ; the impact on operators should be quite obvious] On 9/25/2003 at 11:58 AM, "netadm" <[EMAIL PROTECTED]> wrote: > This is exactly the problem with certain e-mail block lists (i.e. > www.spamhaus.org). A few zealots who control this particular block list > have made a decision based on inaccurate information. > Mr. Linford has listed (in his block list) 48 /24s allocated to Infolink > (yes we are a real ISP with real customers) for 2 customers we are > working to terminate. > In addition, as previously mentioned, Mr. Linford refuses to remove > listings once we notify him of the termination. And with good reason. > Given the above, it is imprudent for any network operator (North > American or Other) to use Mr. Linford's SBL to restrict the delivery of > e-mail. It is inadvisable for any network operator to even accept your BGP announcements like yours, inbound into their network: Anyone who is bleeding 32 /24's in addition to an enclosing /19 supernet (presumably out of incompetence, but maybe this is part of a strategy to circumvent less-skilled operators nullrouting the /19 at router level, and failing to notice that that doesn't work when there's longer prefixes) is worthy of being dropped for stealing too much of our router CPU/RAM. Anyone who (at least at one point in the past) replied to mail sent to [EMAIL PROTECTED] with a note that the complaint will be ignored and the only complaints that will be addressed (yeah right) are those sent in PLAIN OLD PAPER HARDCOPY, deserves no access to other networks whatsoever. Any ASN that announces the equivalent of only 51 /24's, yet manages to generate 106 AUP violations (mailing spamtraps, dead users, failing to yield to SMTP 550, etc., many of them continuous 'repeat action') in a four month period to 2 rather small MXs, and continues such illegal trespass after their 4 upstreams are informed (and have in turn informed you) of this continuously, deserves to be dropped until the end of time. Current AS 15083 upstreams: 2914 (Verio) 16631 (Cogentco) 19094 (Adelphia/telcove.com) My guess is that abuse@ people at (at least) Verio and Adelphia are tipping on their toes, waiting until the complaint count has reached the magic number high enough to term you with their management's support, so you can go find yourself some new upstreams - again. That won't change our stance of blocking you by ASN, IP space and known domain names - indefinitely. Given that there is 1000's of systems like ours, this makes the SBL listing seem like an insignificant problem for your so-called "ethucal bizniz". bye,Kai
Re: monkeys.dom UPL being DDOSed to death
On 9/23/2003 at 5:16 PM, "Mike Tancsa" <[EMAIL PROTECTED]> wrote: > http://www.openrbl.org > is also offline due to a DDoS. And the ignorance of front-end personnel in LE agencies, unless you are the NY Times and claim $500,000 in purely fictious damages, can be a bit frustrating. Spamcop and Spamhaus have been undergoing intense DDoS attacks for months, and I am only partially aware how they are being mitigated. If certain large operators can donate bandwidth and equipment for IRC servers in locations with OC-12 and better connectivity, AND live through the DDoS attacks that come with it, why not step forward and provide some forwarding-proxy service for some of the websites and distribution sites for DNSBLs, plus possibly proxying DNS traffic? OpenRBL.org has stated (http://www.openrbl.org/index-2.htm) that the bandwidth required for actual application traffic can be very low (0.5Mbps or less), not counting DDoS traffic. No arrangements of that kind have to be public knowledge. Other measures: - Got a spare /20 that can be used to make the forwarding proxy hop around a bit, every 5 minutes or so, with DNS TTLs in the 10-minute range? It's been done with 'moving-target' spamvertised sites like optinspecialists.info , which is currently using a LARGE number of compromised Windows hosts illegally to proxy DNS and HTTP traffic for them. They've been doing it for weeks. Do the registrars care? Hell no. (see morozreg.biz, bubra.biz, the domains used for DNS, domains you probably want to add local zone overrides for, in your nameservers, not your HOSTS file. Now we know how Al-Quaeda is hiding their websites, at last. It would be trivial to 'sinkhole' DoS traffic still going on to IPs of the recent past, greatly increasing the chances of catching the perpetrators as they keep switching their trojans to new IPs, hitting a few fully-sniffed honeypots while they are at it. - BGP anycast, ideally suited for such forwarding proxies. Anyone here feeling very adapt with BGP anycast (I don't) for the purpose of running such a service? This is a solution that has to be suggested and explained to some of the DNSBL operators. If someone reading this has gone forward with a private mailing list to discuss all these issues, I'd be happy to receive an invitation to donate my [lack of] smarts to the cause. bye,Kai
157.112.0.0/16 ARIN info updated, AT&T still announcing /16
>From the [Hijacked] list: > The ARIN information has been updated to have up-to-date contact info for > the original owner, the original owners' ISP is announcing 4 /18s but AT&T > is still announcing 157.112.0.0/16. Can whoever's been bugging AT&T to stop > announcing it to bug them some more? [EMAIL PROTECTED] seems to be a dead horse - demands from numerous parties, including the owner of this /16 (the true source of records is JPNIC: whois -h whois.nic.ad.jp "157.112.0.0 /e" , ARIN has not proceeded with 'early registration' transfer of this group of records to JPNIC, it seems) that have been mailed there and to various other @att.net addresses, including their so-called "legal demands center" (that is reportedly hard to reach via email) have been summarily ignored, and we mean "/dev/null'd". AT&T, for lack of presenting any TRO forcing them to keep routing this, appears to willingly conspire with the Empire Towers IP space hijackers while presented with overwhelming evidence that whatever forged documents Empire Towers and Thomas Cowles may have presented to them are indeed that - forged. ARIN zapping the legacy record for this block apparently isn't convincing enough for them to stop announcing this route. The ISP for Systems Clipper Inc. (AS 23720) had started announcing a competing /16 almost 2 weeks ago, but for reasons obvious to nearly all members of this list, that of course wasn't good enough: it's four /18's now, and AT&T should be seeing none of the traffic just about now. If you are peering with AS 7018, a nicely worded email to your peering contacts expressing your concern with AT&T's non-existent cooperation in IP space hijacking cases would be appreciated. Thank you. bye,Kai ps: and this says nothing about the amount and nature of actual abuse that's been reported from this /16 while it originated from AS 7018.
paging AS226 : 63/8 does not belong to you
(whois.arin.net once again resolves, thanks Rodney Joffe who seems to have gotten this fixed before I could reply to him) Now today: route-views.oregon-ix.net>sh ip bgp 63.0.0.0/8 BGP routing table entry for 63.0.0.0/8, version 1548358 Paths: (1 available, best #1, table Default-IP-Routing-Table) Not advertised to any peer 7500 2516 226 202.249.2.86 from 202.249.2.86 (210.173.176.242) Origin incomplete, localpref 100, valid, external, best Now: what is ln.net's excuse for not updating the ARIN registration for AS 226 since 1991? An AS with this amount of IP space advertised: (http://bgp.potaroo.net/cgi-bin/as-report?as=226&view=4637) Rank AS TypeOriginate Addr Space (pfx) Transit Addr space (pfx) Description 224 AS226ORG+TRN Originate: 739584 /12.50 Transit: 922880 /12.18 LOS-NETTOS-AS Los Nettos ...can't keep it's own ASN record up to date? bye,Kai
arin.net DNS problems
rcvd: 437 The *.nstld.com servers are answering to these queries in normal fashion. bye,Kai -- "Just say No" to Spam Kai Schlichting New York, Palo Alto, You name it Sophisticated Technical Peon Kai's SpamShield is FREE! http://www.SpamShield.org | | LeasedLines-FrameRelay-IPLs-ISDN-PPP-Cisco-Consulting-VoiceFax-Data-Muxes WorldWideWebAnything-Intranets-NetAdmin-UnixAdmin-Security-ReallyHardMath
Re: Cable & Wireless, Verio and/or Level 3 port blocking?
On 9/8/2003 at 3:58 PM, "Stephen J. Wilcox" <[EMAIL PROTECTED]> wrote: > I dont have a url for such an app (assuming one has been written) but you should > be able to run a traceroute using the tcp ports and see where it stops? > Steve > On Mon, 8 Sep 2003, William Devine, II wrote: >> >> Can anyone from these three carriers tell me if you're doing port blocking >> on the Windows file/print ports (135-139, 445 & 593) ? >> A client of ours (in the US), against our recommendation, still wants to >> connect to their Exchange server in the UK without a VPN. We're not >> blocking their IP#'s from anything but somewhere in between it's getting >> blocked. We use C&W directly and Verio/Level3 through a peer. >> >> Thanks! >> william That'd be http://michael.toren.net/code/tcptraceroute/ bye,Kai
Re: CalPOP contact? HTTP CONNECT scanning
On 9/3/2003 at 8:17 PM, "Jeroen Massar" <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > As people are complaining all around about ISP's, > here is my small question. Who has a _working_ contact at > "CalPOP" (216.240.128.0/19 and others). It is not in puck :( > If anybody has a working one please mail it me offlist so > that the following long version of the problem can be solved. > Is there anything alive at CalPOP that doesn't try > to abuse open proxies for massively spamming hotmail ? > These are the hits from Sep 3rd: [Spam-L] BLOCK,MISC: WHO'S SPAMMING YOU? (2003-08-27) Top 40 Proxy-Hijacker-Friendly Nets http://www.monkeys.com/phl/top-20030827.post 10. 216.240.140(4) level3.net - calpop.com (Los Angeles, CA) days.cblock=2 29. 216.240.149(3) level3.net - calpop.com (Los Angeles, CA) days.cblock=5 We consider them a 'possibly rogue operator' at this point. We have numerous logged instances of unlawful trespass from their IP space - mail or attempted mail to spamtraps - and real uglyness like 66.250.115.0/24 (no longer announced by them) housing the proxy-scanning criminals at nextdatacorp.com/ newengineroom.com. Never a darn word from them, except auto-replies. Their appearance in RFG's "top-40" list is definitely paving the way for death-by-ASN-filter (joining 90+ others). ARIN has marked the contact info for AS 7796 as invalid - BACK IN MAY(!) - and "Network Operations Account" has confirmed to us that they (AS 13374) are not the registrant of that ASN, but CalPOP is. CalPOP has certainly had every opportunity to correct the false record(s) in question with ARIN by now. Unless ARIN steps into this discussion and gives us a good reason why they haven't updated anything (e.g.: no or false documentation provided by CalPOP), I'll assume that this lack of even remotely accurate records for the ASN is deliberate, rather than mere negligence, and evokes strong suspicions of this ASN being hijacked, bar evidence to the contrary. The fact that their upstreams are or have been: - Level3 (known spammer-tolerant, complaint-ignorant, deliberately hiding customers in their IP space without SWIP/rwhois) - rogue operator AS 22298 (ewan1.com) (RIS says they are gone since 2003-08-25) - Cogent (known spammer-tolerant, complaint-ignorant) (RIS says they are gone since 2003-08-06) lets you expect nothing good coming from calpop.com . AS 7796 announcing 216.240.128.0/19 as 32 /24's should make some people here wonder: who the hell am I wasting my router's RAM for, and why am I still accepting /24's from space other than the traditional swamp? bye,Kai ps: RFG's monkeys.com is undergoing a joe-job right now - with the suspects most certainly present within (or acting on behalf and in concert with) the group of hard-core computer criminals listed in his "Top 40" list. Which criminals does your employer support?
Re: Windows update down again?
On 8/17/2003 at 5:27 PM, "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> wrote: > It's just come back now. Must have been a temporary holding page while > they did some maintenance. > On Sun, 17 Aug 2003, [EMAIL PROTECTED] wrote: >> >> Hi all, >> >> I was just updating a couple of Windows machines and had been using >> Windows Update without any problems until about 5 mins ago (22:10 GMT) >> when I've started getting this: >> >> "Thank you for your interest in Windows Update >> >> Windows Update is the online extension of Windows that helps you get the >> most out of your computer. >> >> The latest version of Windows Update is available on computers that are >> running Microsoft Windows 98, Windows 98 Second Edition, Windows >> Millennium Edition, Windows 2000 (except Windows 2000 Datacenter Server), >> Windows XP, and the Windows Server 2003 family." >> >> URL is http://v4.windowsupdate.microsoft.com/default.asp which redirects >> to http://v4.windowsupdate.microsoft.com/en/thanks.asp. Also happens for >> http://windowsupdate.microsoft.com/. >> >> This is from multiple machines running Windows 2000 (Pro and Server) and >> Windows 2003 server. Anyone else seeing this yet? >> >> Does anyone know of an alternative URL for Windows Update in the meantime? >> >> Rich Not exactly. Windows update has been failing lately when the computer trying to use it is using a web proxy (Squid, etc.). I have tracked this down to said proxies not being able to proxy objects larger than about 1MB in size: some down-the-line chained proxies I administer were running "cache_mem 4 MB" - and that breaks it consistently. Why this breaks M$ Windows update and seemingly little else is beyond me: I don't know the exact fail-over mechanics of Squid, but I have downloaded single files greater than 50MB through proxies with only 8MB cache_mem with nothing unusual happening. bye,Kai
Re: Edge 1 Networks/Williams Communications Group
(off-topic) On 8/4/2003 at 10:26 PM, "Jeff Kell" <[EMAIL PROTECTED]> wrote: > After several run-ins with Edge 1 Networks [69.44.28.0/22] having their > machines "hijack" victim machines on our networks infected with Jeem, > and then making their spam runs, I've had it. I have reported both to > Edge 1 and their parent Williams Communications Group [AS7911] with no > result and I will be blocking Edge 1 [in theory, AS29986, but no doubt > private spewage from WCG.NET). [I omitted quoting the follow-up post where Nick Geyer and Chris 'Rizler' Smith are being ratted out by fellow IP space hijackers at Web Design House (AS 26857): - 199.60.102.0/24 hijacked by registering henningassoc.com (which has the same POC e-mail addr as AS26857 until recently: [EMAIL PROTECTED], with interesting nameservers that have since moved out of that /24: NS1.NANOG.US 216.66.69.69, NS2.NANOG.US 216.66.69.169 ; - announced hijacked 148.3.32.0/20 IT-SOUTHLTD.COM - provided transit for AS 27526 (endai.com/endai.net/dmx0.com), originating hijacked 148.3.0.0/21 (IT-SOUTHLTD.COM) ] The following (now posted daily) feature in Spam-L should make some silent NANOG subscribers ask themselves a question: do I work for a large criminal enterprise and could my own actions as an employee be considered active participation with possible criminal culpability? And for those OTHER NANOG subscribers that decided that joining the unemployment line after the Internet bubble burst was not for them, but legal work suiting their qualifications was nowhere to be found: you should read up on some of the statutes of limitations for computer fraud and abuse acts (federal and state) and reconsider your current activities. Your acts are definitely not going unnoticed nor are they being ignored. There's a reason why Chris 'Rizler' Smith and 2 of his associates fled^Wrelocated to Costa Rica, you know, but Mary Jo White sure as hell didn't care that the last batch of people she had indicted had relocated to small caribbean island nations to evade US justice: http://zdnet.com.com/2100-11-508027.html ISPs, including Level3.net and Cogent, are conspiring (that's what 'knowingly providing assistance to the perpetrator of a criminal act' actually is) with hard core computer criminals, and there's a handy list right here: --- This is a forwarded message From: Ronald F. Guilmette To: [EMAIL PROTECTED] Date: Monday, August 4, 2003, 4:06:47 PM Subject: BLOCK,MISC: WHO'S SPAMMING YOU? Top 40 Proxy-Hijacker-Friendly ISPs 2003-08-04 ===8<==Original message text=== Date: Mon, 4 Aug 2003 13:06:47 -0700 Sender: Spam Prevention Discussion List <[EMAIL PROTECTED]> From: "Ronald F. Guilmette" Subject: BLOCK,MISC: WHO'S SPAMMING YOU? Top 40 Proxy-Hijacker-Friendly ISPs 2003-08-04 To: [EMAIL PROTECTED] Precedence: list The following list is based on proxy honeypot network data collected between 12 Noon 2003-08-03 and 12 noon 2003-08-04. Commentary follows below... 1. 38.112.197 cogentco.com - daicahosting.com/daica.com (Tampa, FL) 2. 38.114.11 cogentco.com - tailoredservers.com (Frisco, TX) 3. 66.135.15 broadbandip.net (Baton Rouge, LA) 4. 38.114.3cogentco.com - tailoredservers.com (Frisco, TX) 5. 63.246.136 unitedcolo.com aka sagonet.com (San Francisco, CA) 6. 66.44.228 sterlingnetwork.net - savanti.net (Tucson, AZ) 7. 166.90.206 level3.com - ?Alan Ralsky? (Detroit area, MI) 8. 66.118.187 sagonet.com (Tampa, FL) 9. 63.246.135 unitedcolo.com aka sagonet.com (San Francisco, CA) 10. 66.250.125 cogentco.com - applicationx.net (Alpha, NJ) 11. 66.111.39 unitedcolo.com aka sagonet.com (San Francisco, CA) 12. 63.246.133 unitedcolo.com aka sagonet.com (San Francisco, CA) 13. 66.118.189 sagonet.com (Tampa, FL) 14. 64.5.51 theplanet.com (Dallas, TX) 15. 66.111.49 unitedcolo.com aka sagonet.com (San Francisco, CA) 16. 66.118.142 sagonet.com - argobroadcast.com (Tampa, FL) 17. 66.205.223 cetnetworks.com - smartmailhosting.com (New Orleans, LA) 18. 66.44.231 sterlingnetwork.net - savanti.net (Tucson, AZ) 19. 64.180.125 telus.net - "Trinity Prof-Soho" (Vancouver, BC, CA) 20. 206.47.187 bell.ca - "Datatech Communications" (Windsor, ON, CA) 21. 66.17.157 yipes.com - net-sentry.net (Dallas, TX) 22. 38.118.143 cogentco.com - infinology.com (Goleta, CA) 23. 66.118.180 sagonet.com (Tampa, FL) 24. 216.99.99 nutnbut.net - pntsi.ca (London, ON, CA) 25. 66.111.40 unitedcolo.com aka sagonet.com (San Francisco, CA) 26. 66.70.114 datapipe.com (Hoboken, NJ) 27. 66.111.33 unitedcolo.com aka sagonet.com (San Francisco, CA) 28. 209.50.253 servint.com (McLean, VA) 29. 219.109.197 tcn-catv.ne.jp (Tokyo, JP) 30. 66.205.219 cetnetworks.com (Redwood City, CA) 31. 63.246.131 unitedcolo.com aka sagonet.com (San Francisco, CA) 32. 61.220.193 hinet.net (Taipei, TW) 33. 38.112.199 cogentco.com - daicahosting.com/daica.com (Tampa, FL) 34. 66.111.35 unitedcolo.com aka sagonet.com (San Francisco, CA)
MFN/AboveNet blocking pac-rim.net/spamshield.org MX
Coming back from my vacation, I had to discover that some losers (who, no doubt, had something to lose as far as their hijacked IP space is concerned) have attempted to DoS the MX for pac-rim.net/spamshield.org by sending a few 100,000 spams with randomized @pac-rim.net return addresses around June 25/26th, and us seeing 10,000's of bounces generated by misbehaving mail hosts that bounce to MAIL FROM: addresses sometime after their mail back-end decides that the recipients don't exist (nice AOL-style abuse amplifier, just un-AOL-like unthrottled). At the same time, MFN/Above.net seems to have null0'd 208.241.101.2 (in response to that? we have yet to see a SINGLE complaint/forwarded copy), thus denying transit of all their non-multihomed downstreams (or those that transit through them to the UUnet /10 aggregate this IP lives in) to our MXs, as well as the SpamShield.org website and the private SpamShield DNSBL zone origin host. While we have to suffer constantly under attempts of unlawful trespass originating from MFN/Above.net's customers, with never a peep of a follow-up after the auto-reply coming back from [EMAIL PROTECTED] (and in quite a few cases with such trespass continuing unabated) we've never bothered to null0 more than a surrounding /22 around for such abuse for more than a brief amount of time (1-3 days max). Whoever is wielding 'enable' power at MFN/AboveNet may want to re-think what abuse actually is - and may want to consult with his boss at this time wether it was appropriate to block a DoS victims' MX without contacting same beforehand. Meanwhile it seems that it took Above.net a LOT longer to null0 hijacked IP space (like: a couple weeks) announced from customer AS 26891 than it took them to null0 a /32 they seemed to perceive as a threat that isn't paying them: # routes (20030515): # 199.120.163.0/24 from AS: 26891 (upstreams: 6461), # 199.120.164.0/24 from AS: 26891 (upstreams: 6461), # 199.166.200.0/22 from AS: 26891 (upstreams: 6461), # 199.201.151.0/24 from AS: 26891 (upstreams: 6461), # 199.201.152.0/24 from AS: 26891 (upstreams: 6461), # 204.19.162.0/24 from AS: 26891 (upstreams: 6461 23352), (all gone now) Waiting for AboveNet/MFN's mail on this - and no, renumbering the host to another IP number would be too annoying. bye,Kai sonet:~# tcptraceroute -s 208.241.101.2 whois.gandi.net Selected device exp0, address 208.241.101.2, port 58193 for outgoing packets Tracing the path to whois.gandi.net (80.67.173.20) on TCP port 80, 30 hops max [...] 4 0.so-1-1-0.XL2.NYC1.ALTER.NET (152.63.19.98) 10.150 ms 8.815 ms 10.136 ms 5 0.so-7-0-0.XL2.NYC8.Alter.Net (152.63.0.37) 13.199 ms 11.889 ms 12.103 ms 6 0.so-3-0-0.XR2.NYC8.ALTER.NET (152.63.19.34) 16.530 ms 13.251 ms 11.268 ms 7 182.ATM6-0.BR1.NYC8.ALTER.NET (152.63.23.173) 8.762 ms 7.053 ms 10.339 ms 8 * * * 9 * * * ^C sonet:~# tcptraceroute -s another.address.on.the.same.box whois.gandi.net Selected device exp0, address x.x.x.x, port 58185 for outgoing packets Tracing the path to whois.gandi.net (80.67.173.20) on TCP port 80, 30 hops max [...] 4 0.so-1-1-0.XL2.NYC1.ALTER.NET (152.63.19.98) 9.631 ms 8.728 ms 10.066 ms 5 0.so-7-0-0.XL2.NYC8.Alter.Net (152.63.0.37) 9.621 ms 8.731 ms 10.017 ms 6 0.so-3-0-0.XR2.NYC8.ALTER.NET (152.63.19.34) 9.663 ms 8.736 ms 10.131 ms 7 182.ATM5-0.BR1.NYC8.ALTER.NET (152.63.23.77) 19.588 ms 9.054 ms 10.067 ms 8 200.atm6-0.pr1.lga2.us.mfnx.net (208.184.231.245) 29.625 ms 36.590 ms 29.811 ms 9 so-2-2-0.cr2.lga2.us.mfnx.net (216.200.127.169) 49.795 ms 35.010 ms 29.780 ms 10 so-0-0-0.cr2.lga1.us.mfnx.net (208.184.232.197) 49.766 ms 28.664 ms 39.752 ms 11 so-6-0-0.cr2.lhr3.uk.above.net (64.125.31.181) 99.797 ms 103.668 ms 99.700 ms 12 so-0-0-0.cr1.lhr3.uk.above.net (208.184.231.145) 109.793 ms 108.402 ms 99.705 ms 13 pos12-0.cr1.cdg2.fr.above.net (64.125.31.130) 109.857 ms 107.870 ms 109.774 ms 14 pos0-2.er1a.cdg2.fr.above.net (208.184.231.205) 109.799 ms 108.622 ms 109.779 ms 15 gitoyen-voltaire-gw.gitoyen.net (62.4.73.30) 119.632 ms 111.625 ms 109.781 ms 16 80.67.168.6 (80.67.168.6) 129.879 ms 119.700 ms 109.803 ms 17 jd.gandi.net (80.67.173.20) [open] 109.893 ms 1.390 ms 119.798 ms
Re: Ettiquette and rules regarding Hijacked ASN's or IP space?
On 6/9/2003 at 4:06 PM, "Christopher L. Morrow" <[EMAIL PROTECTED]> wrote: > Sure, you are announcing 196.1.1.0/24 and only that, fine, but are you > allowed to announce that prefix? Are you "Centre for Monitoring Indian > Economy" ?? Or is this your direct customer and you are just the sat-link > provider for him? Being able to answer such 64,000-dollar-questions with authority is the issue ARIN's registry operations are facing, pass or fail. And you can take that literally: the recent hijacking events have put ARIN's rules, procedures and current registry data so much into question - it'll be (do || die) for them. The inherited Internic data going back almost 20 years doesn't help things. Indeed, I think that any and all legacy assignments should be purged, like the old Usenet, one by one. Some things that could be done: - contact all owners of IP space or ASNs with a demand to show legal, notarized paperwork showing their company's status as incorporated/active, and/or legal successor to the original registrant. Gotta use those 7 years of business records you're required to hold for something! - non-announced IP space with defunct contacts: -> reserved status, no AS may route those, until resolved per above - non-announced IP space with working contacts: email to POC every 30 days with the legal demands (email/paper mail). After 90 days: network set to 'reserved' status, no AS may announce these, until resolved per above. - announced IP space: announcing AS to be contacted in addition to POC for the network object. For AS's in violation, this shall mean that all upstream ASs as visible at popular exchange points should be contacted (at least once) as well. - announcing AS's that violate the 'do not announce' rule shall be dealt with in ways similar to the non-cooperating entities described in: http://www.arin.net/policy/2003_1.html - they will get their own network objects suspended. - complete publicly accessible list of all 'reserved' networks - the DNSBLs and private BGP blackhole feeds will do the rest. Wouldn't you want to know how quiet your inbox can be, when you have a BGP4 blackhole feed with SPEWS L1 as the source...
Re: receiving spam to NANOG-harvested archive message-id's
On 5/27/2003 at 3:26 PM, I wrote: > Speaking of the archives: www.nanog.org makes no reference to the list > archives at http://www.nanog.org/email.html any longer - where did they > go? humans finding and using it is desirable :) (rather than illegal web > harvesters) Thanks to a number of people, including List-Mom, that have pointed me to the right location: http://www.nanog.org/mailinglist.html and from there: http://www.cctec.com/maillists/nanog/index.html http://www.merit.edu/mail.archives/nanog/ It appears that http://www.nanog.org/isp.html is freshly redesigned and is not (yet) linking to the above page. And no, the archives have the headers stripped. Can't see the Message-ID's there. Hmm.
receiving spam to NANOG-harvested archive message-id's
I have received spam to a [EMAIL PROTECTED] address belonging to a post to NANOG 2 years ago: Date: Fri, 18 May 2001 13:59:06 -0400 From: Kai Schlichting <[EMAIL PROTECTED]> Message-ID: <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: mobile.att.net MX meltdown Speaking of the archives: www.nanog.org makes no reference to the list archives at http://www.nanog.org/email.html any longer - where did they go? humans finding and using it is desirable :) (rather than illegal web harvesters)
Re: RIPE Down or DOSed ?
On 2/27/2003 at 9:58 PM, [EMAIL PROTECTED] wrote: > ... > NetRange: 69.6.0.0 - 69.6.63.255 > CIDR: 69.6.0.0/18 > NetName:WHOLE-2 > NetHandle: NET-69-6-0-0-1 > Parent: NET-69-0-0-0-0 > NetType:Direct Allocation > NameServer: NS1.WHOLESALEBANDWIDTH.COM > NameServer: NS2.WHOLESALEBANDWIDTH.COM > ... > Where are the swips? The rest of that record makes no mention of an > rwhois server. Doing a bunch of whois requests for IPs in that block, I > found only one swip (for a /21). I realize the ARIN regs don't seem to > require that reassignment info be made available to the public (just to > ARIN), but using your innocent customers (if there are any) as a shield to > hide your spammer customers is just wrong. Should I block 69.6.4.0/24 > from sending email into my systems? 69.6.0.0/18? Correct answer: the /18, and then some. Oh, how you wished you hadn't posted this to the list (and Cc:'d wholesalebandwidth.com on it), but chosen reply-to-poster :) Random example from this block appearing in my rejects: http://www.openrbl.org/lookup?i=69.6.4.153 or: "I see red!" Extended answer directly from my auto-complaint override map: 'as:26956' => 'as:17054,isp:cogent', # netfreeinc.com/wholesalebandwidth.com - rogue AS 'as:11938' => '[EMAIL PROTECTED],isp:verio', # wholesalebandwidth.com - rogue AS 'as:17054' => '[EMAIL PROTECTED],isp:genuity,[EMAIL PROTECTED],isp:gblx', # e-xpedient.com - rogue AS? Anything announced out of 26956 and 11938 goes straight to the sendmail access file here, and given the various pointers from OTHER rogues back to 17054, e-xpedient.com routes will be there RSN, too. And if you thought /18 is a big block in spammer-hand, go check out various DNSBLs for listings and the history of AS's announcing portions of: 142.105.0.0/16 162.73.0.0/16 160.122.0.0/16 157.156.0.0/16 138.121.0.0/16 160.116.0.0/16 144.176.0.0/16 146.100.0.0/16
Re: RIPE Down or DOSed ?
On 2/27/2003 at 1:44 PM, [EMAIL PROTECTED] (Will Yardley) wrote: > There is no public access to rwhois.level3.net (it worked at one point, > but, accurding to Level3, not intentionally). They say that they don't > have to make this information available to anyone except ARIN. I was > always under the impression that delegations had to be publicly visible, > but looking at ARIN's policy more closely, it seems that the information > only has to be available to ARIN. Secrecy over a public resource = no oversight = facilitator of abuse. It has worked as long as I can remember, and them intentionally shutting it off is completely against letter and spirit of ARIN's allocation policy: rwhois, or SWIP delegations, but not "none of the above". 7018 Realized this for 12.0.0.0/8 at some point. Why do I get the distinct feeling that this "move" by Level3 is aimed not at creating greater customer privacy (it never served POC email addresses), or protecting themselves from getting their customer base poached by other providers, but at preventing people from identifying spamming Level3 customers (of which they seem to have 100's) by organization name and being able to correlate activity from different netblocks of theirs. So instead of select prefixes, most longer than /24 appearing in the various DNSBLs that do manual listing "by organization" (Spamhaus SBL, SPEWS, Wirehub), Level3 customers can now look forward to /24 to /17 knock-outs that should absolutely positive cover the hiding criminal scum they so willingly receive money from. And then some. If you are a Level3 customer using Level3 IP space, you might want to expediously insist that your IP space delegation appears at whois.arin.net properly, or else consider a new network provider or buying yourself your own /16 on the grey market^W^W^W^Wacquire a defunct company with a mostly unused /16. What did Randy once say? "I welcome my competitors running their networks this way" (paraphrased)
Staten Island refinery fire
News reports say that about 10:10am EST, a refinery (Mobile Port) at the channel between New Jersey and Staten Island caught fire due to a propane barge explosion: When I passed by the Verrezano Narrows bridge (on the other side of S.I., towards Brooklyn) at around 10:25am, there was a GIANT plume of smoke rising at least several miles into the air before being blown by the wind in south/south-eastern direction. www.news12.com and www.ny1.com are completely slashdotted right now, with www.cnn.com having slowed to a crawl.
Re: MIA: oregon-ix.net
On 11/20/2002 at 1:37 PM, Jared Mauch <[EMAIL PROTECTED]> wrote: > I was getting dns resolver errors earlier back. > (like the zone expired) > it appears someone fixed something since. > - jared Mental note to self: never rely on results of an investigation you did a few days ago - *gulp* Indeed the resolver problems I had as well have triggered my email to the list, but I had previously investigated the "disappearance" of the network route-views.oregon-ix.net lives in - it plainly disappeared from my own site's BGP4 views. I am receiving other /24's out of 198.32.0.0/16 though (plenty of them), and route-flap dampening didn't kill it. Surely not a PBMS (problem between monitor and chair), and I expect a reaction from the NOC responsible through the regular support channel shortly. Thanks to Joel Jaeggli and Lucy E. Lynch from UO Academic User Services for pointing out the man behind the curtain that is BIND :) Go Ducks! Thanks, bye,Kai
Re: Weird distributed spam attack
On 11/20/2002 at 12:40 PM, <[EMAIL PROTECTED]> wrote: > In addition to thousands of open relays, which are bad enough in > their own right, there are also thousands of open proxy servers > which a growing number of spammers have been using to launch spam > runs lately. I suspect that's what you're seeing. Almost all SMTP dictionary-crack attacks are done through open proxies, otherwise it's a "delivery attack" carrying actual spam. Some ISPs seem to have problems understanding the concept that log evidence showing 200 unknown users being probed is in-your-face evidence of illegal trespass and accessing another host/network without authorization. Indeed, the SMTP-cracking malware that Elcomsoft (Advanced Maillist Verifier Pro) pumps out, specifically uses "rotating proxies" to do its illegal work. Talk about a company not worth defending, even if it's against the DMCA. Dimitry should find himself a more ethical employer, even if Adobe was wrong on this to begin with. > If you aren't blocking traffic from open proxy servers via a dns > blacklist, I predict that you will definitely see increasingly > aggressive spam attacks coming in from diverse locations (although > the more you look at the problem, the easier it becomes to identify > the handful of carriers who are open proxy-tolerant). If you don't use at least several DNSBL's, you are already DEAD from dictionary attacks, I'd say. I have personally observed an attack against a DS3-connected server from a single source IP, ratcheting through 2400 RCPT TO: checks in just 2-3 seconds. Yes, they are not trying to hide very well, they are trying to crack through your mail server at maximum speeds, with 10-25 probes per connection. There is a demonstration patch for Sendmail to slow down the SMTP dialogue (at the expense of keeping the process in memory too long, and long after the attacking host disconnects) at http://www.spamshield.org/sendmail8.9.0b5-rcpt-patch.txt Do not use this in production, unless you really know what you are doing and are tongue-in-cheek with Sendmail and its source: it has several deficiencies that are obvious to a good observer (and tester) and that may impede or render it useless to most. I wonder if Eric ever reconsidered by suggestion (from 4-5 years ago) to optionally drop processing arguments for a given SMTP dialogue if the client host disconnects the TCP connection prematurely [while not in "pipeline" mode, but the latter was not part of the argument]. This is very much Sendmail-specific, so you may ignore this. > [I will also say that it would really be great if mail-abuse.org would > add an open proxy listing project to complement their RSS, DUL, and > other initiatives.] What we really want is a DNSBL that lists SMTP dictionary-crack attacks in real-time. The overlap of the mechanics required for running this with other DNSBL's are obvious: Unfortunately I could only spare some expertise, but not a whole lot of time or expenses to set something like that up (and merge it into an existing DNSBL such as Osirusoft's as far as day-to-day ops is concerned). Without touting my horn, SS2.0 will succesfully defend a given (OS)Sendmail (Un*x) against SMTP dictionary-cracking, distributed or not, but other significant reasons are holding up its release right now, in case you were going to ask. bye,Kai
MIA: oregon-ix.net
As some of you have noticed, the BGP4 route containing the address for route-views.oregon-ix.net has disappeared a while ago (mid-October?). Their website seems to be gone, and I swear, I couldn't resolve the domain for a little while just now. Has the Oregon IX been shut down? Their route-server was probably the best-connected one, with the most views, of any public route server I am aware of (please prove me wrong, but do not torment me with any web-based looking glasses :) . Nothing like having to poke around 10 other RS's to establish that rogue AS 26212 really only has 1, 6402 and 2914 as their upstreams.
Re: Praise to XO's Security/Abuse
y their customers, and continues to aid and abet these criminal activities on a daily basis by knowingly and willingly providing service and /dev/null'ing complaints about them - kinda like Sprintlink/Sprint aiding and abetting their criminals^Wcustomers while committing acts of forgery, false declaration of goods, false declaration of goods in interstate and international commerce, criminal impersonation, falsification of business records and business and wire fraud across state lines - only more passively. I could point the finger in almost any direction from here. >From UnSavvy to APiss&Pee. From Uh-Oh!Net to Clueless&Witless. >From FraudLynx to VeryUglio, From Exorcism to Worldcunt. The bigger, the more bankrupt, the more aiding and abetting. It's 5pm: do you know who you work for? -- "Just say No" to Spam Kai Schlichting New York, Palo Alto, You name it Sophisticated Technical Peon Kai's SpamShield is FREE! http://www.SpamShield.org | | LeasedLines-FrameRelay-IPLs-ISDN-PPP-Cisco-Consulting-VoiceFax-Data-Muxes WorldWideWebAnything-Intranets-NetAdmin-UnixAdmin-Security-ReallyHardMath
Re: verio arrogance
How's THIS for Verio arrogance, going to a whole new level: http://www.monkeys.com/anti-spam/filtering/verio-demand.ps Details were on the SPAM-L list Wed, 17 Jul 2002 15:51:05 EDT: Verio threatens to sue Ron Guilmette over the IP 208.55.91.59 appearing on his FormMail.pl open-proxy/formmail server DNSBL. And given the ever-increasing number of spammers now hopping onto Verio tells me that Verio must be well down the spiral of death (spammers seem to be attracted by NSP's going chapter 7/11, or who are getting close), or else the dozen-or-so automated messages going to [EMAIL PROTECTED] every week complaining about connections (real or attempted) to hosts under my control, and originating from their spamming customers would have shown any results over time. I don't need connectivity to 208.55.0.0/16. I really don't, and I have not the slightest tolerance for litigious, small-minded, panic-lawyer-dialling scum like this. /etc/mail$ grep 208.55 access.local 208.55 550 Access for FormMail spam and litigious scum denied - Verio in their XXX - we block more than just 208.55.91.59 - Spammers must die - see http://www.monkeys.com/anti-spam/filtering/verio-demand.ps /etc/mail$ PS: I also have zero tolerance for Nadine-type spam-generating, "single-opt-in", "87% permission-based" emailers nowadays: 2 bounces or a single mail to a never-existing account, and all your /24's are off into gated.conf as a next-hop route to 127.0.0.1. And no, they won't get around that by advertising /25's. Good-bye route-prefix-filtering wars, and welcome to the war on spam, where Null0'd /28's for filtering 'undesirables' just doesn't cut it any more. Casualties like 10-15 bystanding rackspace.com customers with a "Nadine- type" mailer in neighboring IP space be damned: "move your servers into a different slum, cause da landlord's running down 'da neighborhood". -- "Just say No" to Spam Kai Schlichting New York, Palo Alto, You name it Sophisticated Technical Peon Kai's SpamShield is FREE! http://www.SpamShield.org | | LeasedLines-FrameRelay-IPLs-ISDN-PPP-Cisco-Consulting-VoiceFax-Data-Muxes WorldWideWebAnything-Intranets-NetAdmin-UnixAdmin-Security-ReallyHardMath