RE: Google contact?

2008-04-17 Thread Raymond L. Corbin

It'd be nice if more companies of their size responded that way. :)

-Ray

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Darden, Patrick 
S.
Sent: Thursday, April 17, 2008 1:40 PM
To: nanog@merit.edu
Subject: RE: Google contact?



Thanks everyone!  Several people from Google responded very quickly, and the 
issue was resolved faster than I can believe.
--Patrick Darden
--ARMC


RE: Problems sending mail to yahoo?

2008-04-13 Thread Raymond L. Corbin

I agree that they aren't completely useless. From our environment the abuse 
desks can be somewhat overwhelmed though. If you setup feedback loops for 
networks size of
1x /16
2x /17
2x /18
1x /19
to receive abuse complaints on dedicated / collocated customers you do get a 
some good complaints. Some of the time it is from compromised scripts, 
sometimes actual spammers, but most of the time it is from forwarded spam. This 
makes the abuse desk full of thousands and thousands of complaints. You can 
look in the headers of the spam complaints and see that it is forwarded spam, 
but it is still overhead. So signing up for a feedback loop for the entire 
network with something like Yahoo! can be burdensome and make abuse@ full of 
useless complaints. This isn't the problem I suppose in most environments, but 
it is in mine. Yahoo! blocking entire /24's are not necessarily a large 
problem, the larger problem is

A. they don't tell you when it is blocked (I don't believe it would be hard to 
email the abuse@ contact of the IP address range..)

B. their 'Bulk Mail Advocates' say they cannot tell what IP's are generating 
the /24 block once it is in place (perhaps it can be prior to the block?).

C. They offer no way to exempt certain IP addresses to be exempted from the /24 
'de-prioritization'. This means the smaller companies who send maybe 3 or 4 
emails to Yahoo a day are having difficulty and there's nothing you can do 
until the issue with the entire /24 is solved.

Administrators who actually find ways to get in touch with Yahoo to resolve 
issues are hindered by Yahoo's stance of 'It's coming from your network, you 
should be able to monitor it and figure it out'. In a dedicated/colo 
environment I don't think it is really reasonable to expect companies login to 
each server in a /24 to see who is sending mail to Yahoo. And even if they are 
sending mail to Yahoo were not psychic so we cannot tell what their users are 
marking as spam and what's not. I suppose the feedback loop would say that 
but...then abuse@ is flooded with complaints that are mostly mutual customers 
fault. Chances are if a server is sending spam to Yahoo they are sending it to 
quite a few other places as well which do actively report it.

-Ray


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dave Dennis
Sent: Sunday, April 13, 2008 7:16 PM
To: Geo.
Cc: nanog@merit.edu
Subject: Re: Problems sending mail to yahoo?


On Sun, 13 Apr 2008, Geo. wrote:



  of abuse might be useful for large providers, but since we can't even
  get many domains even to set up the already-specified abuse@ address, much
  less read the mail we send to it,

 When someone like AOL offloads their user complaints of spams to all the
 abuse@ addresses instead of verifying that they actually are spams before
 sending off complaints, is it any surprise that everyone else is refusing to
 do their jobs for them?

 The reason abuse@ addresses are useless is because what is being sent to
 them is useless.

As one that works for a company that makes full use of complaints sent to it,
abuse@ addresses are not useless, far from it.  Please don't get the idea that
because some think they're useless, it therefore is universal.  We also get
100s of AOL feedbacks a day, which are filtered separately.  Also not useless.
And we've also reported incidents to other companies' abuse functions, and had
them be resolved same-day because of it.  Also, far from useless.

How about if you're not actively in an abuse function, you hold off on declaring
the function useless, cause the meme could catch on that it is, even if it's
not, and I've yet to see an automated filtering/blocking system fully replace or
completely obsolete a good trained network operator who understands what is and
is not abuse on the network.

-Dave D


RE: /24 blocking by ISPs - Re: Problems sending mail to yahoo?

2008-04-11 Thread Raymond L. Corbin

It's not unusual to do /24 blocks, however Yahoo claims they do not keep any 
logs as to what causes the /24 block. If they kept logs and were able to tell 
us which IP address in the /24 sent abuse to their network we would then be 
able to investigate it. Their stance of 'it's coming from your network you 
should know' isn't really helpful in solving the problem. When an IP is blocked 
a lot of ISP's can tell you why. I would think when they block a /24 they would 
atleast be able to decipher who was sending the abuse to their network to cause 
the block and not simply say 'Were sorry our anti-spam measures do not conform 
with your business practices'. Logging into every server using a /24 is looking 
for needle in a haystack.

-Ray

From: Suresh Ramasubramanian [EMAIL PROTECTED]
Sent: Thursday, April 10, 2008 11:56 PM
To: Raymond L. Corbin
Cc: Chris Stone; nanog@merit.edu
Subject: /24 blocking by ISPs - Re: Problems sending mail to yahoo?

On Fri, Apr 11, 2008 at 1:22 AM, Raymond L. Corbin
[EMAIL PROTECTED] wrote:

 Yeah, but without them saying which IP's are causing the problems you can't 
 really tell
 which servers in a datacenter are forwarding their spam/abusing Yahoo. Once 
 the /24
 block is in place then they claim to have no way of knowing who actually 
 caused the block
 on the /24. The feedback loop would help depending on your network size.

Almost every large ISP does that kind of complimentary upgrade

There are enough networks around, like he.net, Yipes, PCCW Global /
Cais etc, that host huge amounts of snowshoe spammers -
http://www.spamhaus.org/faq/answers.lasso?section=Glossary#233 (you
know, randomly named / named after a pattern domains, with anonymous
whois or probably a PO box / UPS store in the whois contact, DNS
served by the usual suspects like Moniker..)

a /27 or /26 in a /24 might generate enough spam to drown the volume
of legitimate email from the rest of the /24, and that would cause
this kind of /24 block

In some cases, such as 63.217/16 on CAIS / PCCW, there is NOTHING
except spam coming from several /24s (and there's a /20 and a /21 out
of it in spamhaus), and practically zero traffic from the rest of the
/16.

Or there's Cogent with a similar infestation spread around 38.106/16

ISPs with virtual hosting farms full of hacked cgi/php scripts,
forwarders etc just dont trigger /24 blocks at the rate that ISPs
hosting snowshoe spammers do.

/24 blocks are simply a kind of motivation for large colo farms to try
choosing between hosting spammers and hosting legitimate customers.

srs ..


RE: Problems sending mail to yahoo?

2008-04-10 Thread Raymond L. Corbin

Hello,

I have had to tell some dedicated server clients that they will need to disable 
their forwards to Yahoo or add something like postini for those accounts that 
forward to Yahoo...It generally works...however Yahoo! for the past three 
months is now blocking entire /24's if a few IP's get complaints. They have the 
feedback loops however when you have a network with 175,000 IP addresses and 
you sign up for a feedback loop for them all they tend to flood your abuse desk 
with false positives, or forwarded spam. They also don't keep track of which 
IP's are getting the complaints for you to investigate after the block on the 
/24 so asking them won't help :(. This potentially means one customer could 
easily effect the other customer. They offer whitelisting, but this won't get 
you passed their blocks on the entire /24. They apparently will eventually 
accept the message because they aren't necessarily 'blocked' but they are 
'depriortized' meaning they don't believe your IP is important enough to 
deliver the message at that time, so they want you to keep trying and when 
their servers are not 'busy' or 'over loaded' they will accept the message. 
(Paraphrased from conversations with their 'Bulk Mail Advocacies and Anti-Abuse 
manager.)

-Ray

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Chris Stone
Sent: Thursday, April 10, 2008 1:49 PM
To: nanog@merit.edu
Subject: Re: Problems sending mail to yahoo?


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Barry Shein wrote:
 Is it just us or are there general problems with sending email to
 yahoo in the past few weeks? Our queues to them are backed up though
 they drain slowly.

 They frequently return:

421 4.7.0 [TS01] Messages from MAILSERVERIP temporarily deferred due 
 to user complaints - 4.16.55.1; see http://postmaster.yahoo.com/421-ts01.html

 (where MAILSERVERIP is one of our mail server ip addresses)

 Just wondering if this was a widespread problem or are we just so
 blessed, and any insights into what's going on over there.

I see this a lot also and what I see causing it is accounts on my servers
that don't opt for spam filtering and they have their accounts here set to
forward mail to their yahoo.com accounts - spam and everything then gets
sent there - they complain to yahoo.com about the spam and bingo - email
delays from here to yahoo.com accounts



Chris


- 
Chris Stone, MCSE
Vice President, CTO
AxisInternet, Inc.
910 16th St., Suite 1110, Denver, CO 80202
- 
PH  303.592.AXIS x302  -  866.317.AXIS  |  FAX  303.893.AXIS
- 
[EMAIL PROTECTED]| www.axint.net
- 


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Mandriva - http://enigmail.mozdev.org

iD8DBQFH/lMZnSVip47FEdMRClejAJwOeQjw3CHu7C0XCv1vbazfGrJLBQCeP1sd
wDWM0m17XPSV1nOkebTmnJE=
=aiBv
-END PGP SIGNATURE-


RE: Problems sending mail to yahoo?

2008-04-10 Thread Raymond L. Corbin

Yeah, but without them saying which IP's are causing the problems you can't 
really tell which servers in a datacenter are forwarding their spam/abusing 
Yahoo. Once the /24 block is in place then they claim to have no way of knowing 
who actually caused the block on the /24. The feedback loop would help 
depending on your network size. When you have a few hundred thousand clients, 
and those clients have clients, and they even have client, it simply floods 
your abuse desk with complaints from Yahoo when it is obviously forwarded spam. 
So it's more of pick your poison deal with customer complaints about not being 
able to send to yahoo for a few days or get your abuse desk flooded with 
complaints which hinders solving actual issues like compromised accounts.

-Ray

-Original Message-
From: Chris Stone [mailto:[EMAIL PROTECTED]
Sent: Thursday, April 10, 2008 3:33 PM
To: Raymond L. Corbin
Cc: nanog@merit.edu
Subject: Re: Problems sending mail to yahoo?

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Raymond L. Corbin wrote:
 Hello,

 I have had to tell some dedicated server clients that they will need to 
 disable their forwards to Yahoo or add something like postini for those 
 accounts that forward to Yahoo...It generally works...however Yahoo! for the 
 past three months is now blocking entire /24's if a few IP's get complaints. 
 They have the feedback loops however when you have a network with 175,000 IP 
 addresses and you sign up for a feedback loop for them all they tend to flood 
 your abuse desk with false positives, or forwarded spam. They also don't keep 
 track of which IP's are getting the complaints for you to investigate after 
 the block on the /24 so asking them won't help :(. This potentially means one 
 customer could easily effect the other customer. They offer whitelisting, but 
 this won't get you passed their blocks on the entire /24. They apparently 
 will eventually accept the message because they aren't necessarily 'blocked' 
 but they are 'depriortized' meaning they don't believe your IP is importan
t enough to deliver the message at that time, so they want you to keep trying 
and when their servers are not 'busy' or 'over loaded' they will accept the 
message. (Paraphrased from conversations with their 'Bulk Mail Advocacies and 
Anti-Abuse manager.)

I've had to tell some of our customers the same and that if they wanted to
continue the forwarding to their yahoo.com accounts, they'd need to add spam
filtering to their accounts here so that the crap is not forwarded,
resulting in the email delays for all customers. Works for some and
generated more revenue ;-)


Chris

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Mandriva - http://enigmail.mozdev.org

iD8DBQFH/muAnSVip47FEdMRCthkAKCW80FIV2FvdctuCxT3JYI2q0MyfACfai2t
YkgPN/PGEmxsS6tJplWKg90=
=p9F7
-END PGP SIGNATURE-


RE: Problems sending mail to yahoo?

2008-04-10 Thread Raymond L. Corbin

In a large multi-datacenter environment you can't login to each users servers 
and tail their logs to see who's forwarding :( .

I'm more of a windows person, but when working with a client on Linux using 
EXIM I think I did

fgrep yahoo.com /etc/valiases/*   yahoo-fwds.txt

Something like that to get a list of all of the addresses that forward to 
Yahoo...I think they used CPanel on their server too. Other then that I believe 
I was grepping through other clients logs for the most popular Yahoo email 
addresses...

I think that if they are going to do CIDR blocks they should at least keep logs 
as to what caused them to escalate it to that not simply say 'it's your network 
you figure it out..'

-Ray

-Original Message-
From: Chris Stone [mailto:[EMAIL PROTECTED]
Sent: Thursday, April 10, 2008 4:08 PM
To: Raymond L. Corbin
Cc: nanog@merit.edu
Subject: Re: Problems sending mail to yahoo?

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Raymond L. Corbin wrote:
 Yeah, but without them saying which IP's are causing the problems you can't 
 really tell which servers in a datacenter are forwarding their spam/abusing 
 Yahoo. Once the /24 block is in place then they claim to have no way of 
 knowing who actually caused the block on the /24. The feedback loop would 
 help depending on your network size. When you have a few hundred thousand 
 clients, and those clients have clients, and they even have client, it simply 
 floods your abuse desk with complaints from Yahoo when it is obviously 
 forwarded spam. So it's more of pick your poison deal with customer 
 complaints about not being able to send to yahoo for a few days or get your 
 abuse desk flooded with complaints which hinders solving actual issues like 
 compromised accounts.

I look at all my mail server log files and see which logs show obvious spam
being forwarded (a lot of times the MAIL FROM address is a dead giveaway) or
I tail -F the mail log for a bit and watch the spam coming in and forwarding
back out. When I see the forwarding domain that's who I have contacted to
upsell some spam filtering. But, we're a small ISP, so I don't have
thousands, let alone hundreds of thousands of clients, to deal with...



Chris

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Mandriva - http://enigmail.mozdev.org

iD8DBQFH/nORnSVip47FEdMRCi+HAJ9CJoJ/VAkEssv6TznwcYQVGVWkIACfRwhI
VYw0v4HWI8mWs2SHEF3jnq0=
=YMQR
-END PGP SIGNATURE-


RE: Problems sending mail to yahoo?

2008-04-10 Thread Raymond L. Corbin

I hope that's sarcasm? Instead of getting the bounces your messages will simply 
go missing after they accepted it...or you will get bounces sent to you a few 
years after you sent the message...(happened to a client yesterday...).

-Ray

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Henry Yen
Sent: Thursday, April 10, 2008 4:17 PM
To: nanog@merit.edu
Subject: Re: Problems sending mail to yahoo?


On Thu, Apr 10, 2008 at 12:23:24PM -0600, Chris Stone wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512

 Matt Baldwin wrote:
  mostly.  It feels like a poorly implemented spam prevention system.
  Doing some Google searches will turn up some more background on the
  issue.  We've been telling our users that Yahoo mail is problematic
  and if they can to switch away from using them as their private email
  or hosted email.

 Maybe we all should do the same to them until they quit spewing out all the
 Nigerian scams and the like that I've been seeing from their servers lately!

Naaah.  I hear that Microsoft is going to buy Yahoo!, so this problem will
go away once Yahoo! mail gets folded into Microsoft hotmail, whereupon
things will get soo much better!



RE: Yahoo Mail Update

2008-04-10 Thread Raymond L. Corbin

I've talked to employees in other departments who agree that something needs 
changed (especially when their own mail wasn't making it to their personal 
yahoo inboxes)

You can reach yahoo's 'mail' department(s) after doing a lot of digging and 
googling... Their ' Bulk Mail Advocacy Agent' was somewhat helpful, but the 
anti-abuse manager seemed to get things done after you at least try the proper 
channels of submitting a ticket and waiting about a week and still having no 
resolve...I submitted a ticket to them to update my whitelisted IP's from 
adding/removing servers and it took about a month to get a reply.

AOL's postmaster is easy to reach via their 1-800# however they seem to read 
off the screen and are really only general support. Their actual 'postmasters' 
(once you get passed their general support) are usually pretty helpful and 
quick to resolve issues.

-Ray

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of chuck goolsbee
Sent: Thursday, April 10, 2008 8:51 PM
To: nanog@merit.edu
Subject: Re: Yahoo Mail Update


   An anonymous source at Yahoo told me that they have pushed
a config update sometime today out to their servers to help with these
deferral issues.

   Please don't ask me to play proxy on this one of any
other issues you may have, but take a look at your queues and
they should be getting better.

   - Jared

Thanks for the update Jared. I can understand your request to not be
used as a proxy, but it exposes the reason why Yahoo is thought to be
clueless: They are completely opaque.

They can not exist in this community without having some visibity and
interaction on an operational level.

Yahoo should have a look at how things are done at AOL. While the
feedback loop from the *users* at AOL is mostly a source of
entertainment, dealing with the postmaster staff at AOL is a
benchmark in how it should be done.

Proxy that message over and perhaps this issue of Yahoo's perennially
broken mail causing the rest of us headaches will go away. It seems
to come up here on nanog and over on the mailop list every few weeks.

--chuck





RE: Hotmail NOC Contact

2008-04-03 Thread Raymond L. Corbin

Hey,

Are you having trouble emailing them, or them to you. I think this thread is 
about emails coming from hotmail never reaching the destinations. What type of 
problems are you having with these companies?

/r

From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of Fox, Thomas [EMAIL 
PROTECTED]
Sent: Thursday, April 03, 2008 10:37 AM
Cc: nanog@merit.edu
Subject: RE: Hotmail NOC Contact

In the last 10 days or so, ever since ORDB re-activated itself and blacklisted 
everything, we have had deliverability problems to:

MSN
Hotmail
Bellsouth
ATT (the same as Bellsouth I think)
Yahoo
Detroit Edison

In the case of MSN and Hotmail, they told us they were using Symantec’s 
Brightmail filtering system.

So, does that mean Brightmail is not updating their system properly, or 
MSN/Hotmail is not updating their Brightmail?

Seems like a huge waste of everyone’s time because some LARGE network operators 
can’t keep their stuff updated.

*grumble*





RE: Hotmail NOC Contact

2008-04-03 Thread Raymond L. Corbin

yeah,

We do hosting for about 300,000 users in our shared environment. They have 
forwarders setup or aliases that send to their external addresses. This 
forwards their spam as well. We purchased quite a few barracuda servers and 
became their case study for outbound units. They actually do a really good job 
at blocking the spam. But as spam changes every minute, we can only get updates 
every hour. The mail forwarders is the only spam that come from our network. 
Try subscribing to hotmails reporting services so you get reports on spam from 
your IP address, and they have the online reports that show if you add your AS 
so you can see a report for all ip's in your network.

-Ray

From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of Fox, Thomas [EMAIL 
PROTECTED]
Sent: Thursday, April 03, 2008 12:26 PM
To: 'Michael Holstein'
Cc: nanog@merit.edu
Subject: RE: Hotmail NOC Contact

 Do you rewrite/forward mail? .. we're a .edu, and allow our students to
 forward to hotmail/yahoo/whatever .. so when a phishing/malware sweep
 hits campus, about 60% is reflected back onto the Internet (sometimes
 our Anticrap gateway catches it, sometimes not). Because of the way
 addresses are re-written, it looks like it came from us.

Hi Micheal,

We do host mail for about 100 companies, but no remailing.

Tom




RE: Hotmail NOC Contact

2008-04-02 Thread Raymond L. Corbin
Try

https://support.msn.com/eform.aspx?productKey=edfsmsblct=eformts

Is it hotmail users sending your users emails that are being rejected, or is it 
your users sending hotmail emails that end up rejected?

/r

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jason J. W. 
Williams
Sent: Wednesday, April 02, 2008 5:31 PM
To: nanog@merit.edu
Subject: Hotmail NOC Contact


Hey All,

Does anyone have a good contact number for the Hotmail NOC? We've got e-mails 
from Hotmail to some of our customers being returned the Hotmail sender with a 
554 error message fairly regularly. Our logs aren't showing any rejections, so 
we need to talk to Hotmail and find out what the 554 means on their side 
(there's no error description). Any help is greatly appreciated.

-J


Jason J. W. Williams
COO/CTO, DigiTar
http://www.digitar.com
Voice: 208.343.8520
Mobile: 208.863.0727
FAX: 208.322-8522
E-mail: [EMAIL PROTECTED]
XMPP/Jabber: [EMAIL PROTECTED]


RE: Hotmail NOC Contact

2008-04-02 Thread Raymond L. Corbin
I've seen similar things when hotmail users are sending emails to some of our 
users but it bounces back to them within their network. Generally it was DNS 
related. After having about 3 correspondences with them they end up fixing it. 
From what I remember they were sending to the A record and not the MX record.

/r

From: Jason J. W. Williams [mailto:[EMAIL PROTECTED]
Sent: Wednesday, April 02, 2008 6:13 PM
To: Raymond L. Corbin; nanog@merit.edu
Subject: RE: Hotmail NOC Contact


Hi Raymond,

It's @hotmail.com/@live.com/@msn.com addresses sending to our users. The 
senders get a 554 error from Hotmail with no description. Our logs on our side 
are clean, so its a bit of a blackbox. We need some insight from Hotmail's 
side. Thank you also for the link.

-J

Jason J. W. WilliamsCOO/CTO, 
DigiTarhttp://www.digitar.com
Voice: 208.343.8520Mobile: 208.863.0727FAX: 208.322-8522
E-mail: [EMAIL PROTECTED]/Jabber: [EMAIL PROTECTED]



-Original Message-
From: Raymond L. Corbin [mailto:[EMAIL PROTECTED]
Sent: Wed 4/2/2008 3:45 PM
To: Jason J. W. Williams; nanog@merit.edu
Subject: RE: Hotmail NOC Contact

Try



https://support.msn.com/eform.aspx?productKey=edfsmsblct=eformts



Is it hotmail users sending your users emails that are being rejected, or is it 
your users sending hotmail emails that end up rejected?



/r



From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jason J. W. 
Williams
Sent: Wednesday, April 02, 2008 5:31 PM
To: nanog@merit.edu
Subject: Hotmail NOC Contact



Hey All,

Does anyone have a good contact number for the Hotmail NOC? We've got e-mails 
from Hotmail to some of our customers being returned the Hotmail sender with a 
554 error message fairly regularly. Our logs aren't showing any rejections, so 
we need to talk to Hotmail and find out what the 554 means on their side 
(there's no error description). Any help is greatly appreciated.

-J


Jason J. W. Williams
COO/CTO, DigiTar
http://www.digitar.com
Voice: 208.343.8520
Mobile: 208.863.0727
FAX: 208.322-8522
E-mail: [EMAIL PROTECTED]
XMPP/Jabber: [EMAIL PROTECTED]

!SIG:47f3fe96285631435346667!


RE: Yahoo! Mail/Sys Admin

2008-02-27 Thread Raymond L. Corbin

Hello,

Try encorporating DomainKeys and applying for their feedback loop.

http://help.yahoo.com/l/us/yahoo/mail/postmaster/forms_index.html

I still have the same problem. Do you have any users who forward their email to 
their free @yahoo.com addresses from your server?

Let me know if you get in touch with anyone :)

-Ray


From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of Justin Wilson [EMAIL 
PROTECTED]
Sent: Wednesday, February 27, 2008 10:01 AM
To: nanog@merit.edu
Subject: RE: Yahoo! Mail/Sys Admin

Hello Everyone,

It's been a while since I posted on this topic, and unfortunately I'm still
having trouble with Yahoo deferrals.  The links that were provided in this
post worked, but after the forms were received by what I *think* is a human
I still got a canned reply.  I've tried replying with specific details about
our problem, but is either answered with another generic reply or not at
all.  We are running Imall, and each domain has it's own IP address.  Queue
Timer and Tries before returning to sender are set to 30 minutes / 5
attempts.  According to yahoo they do want you to attempt to resend if you
get a 421 error.  SPF is also set on a per-domain basis.   I'm not sure what
else to try. Does anyone have a better understanding of how Yahoo
greylisting works?

Thanks in advance!


Justin Wilson




Running Application when Network Connection Detected

2007-11-27 Thread Raymond L. Corbin

Hey,

Fairly certain this isn't the place for this but I've exhausted my
googling and I'm sure someone here may know. I was looking for an
application that will detect when you connect to a specific wireless
network that when connected automatically run a specified application.
Any ideas?

Thanks!

-Ray


RE: Running Application when Network Connection Detected

2007-11-27 Thread Raymond L. Corbin

Ah. Sorry, guess that would be important. Win XP

Thanks,

-Ray

-Original Message-
From: Paul Fleming [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, November 27, 2007 10:28 PM
To: Raymond L. Corbin
Cc: nanog
Subject: Re: Running Application when Network Connection Detected

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

What OS?


Raymond L. Corbin wrote:
 Hey,
 
 Fairly certain this isn't the place for this but I've exhausted my
 googling and I'm sure someone here may know. I was looking for an
 application that will detect when you connect to a specific wireless
 network that when connected automatically run a specified application.
 Any ideas?
 
 Thanks!
 
 -Ray
 


- --
Paul Fleming
Network Operations
Hostdime.com Inc
Cell:407.468.4646
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (MingW32)

iD8DBQFHTOA5wlPOUqXUp3MRAh4cAKCL5opxZehwnZ07nv+JcljjlvV+nACfavPk
ja8Y+SKxJDN78EyffHk94q4=
=KXXf
-END PGP SIGNATURE-


RE: unwise filtering policy from cox.net

2007-11-20 Thread Raymond L. Corbin

Heh better then my all time favorite was the mailbox is full reply
from an abuse@ address for an ISP based in Nigeria who had a few servers
trying to open umpteen fraud accounts :D

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, November 20, 2007 2:21 PM
To: 'nanog@merit.edu'
Subject: unwise filtering policy from cox.net


if anyone from cox.net is reading...

- The following addresses had permanent fatal errors -
[EMAIL PROTECTED]
 (reason: 552 5.2.0 F77u1Y00B2ccxfT000 Message Refused.  A URL
in the content of your message was found on...uribl.com.  For resolution
do not contact Cox Communications, contact the block list
administrators.)

This seems a rather unwise policy on behalf of cox.net -- their
customers 
can originate scam emails, but cox.net abuse desk apparently does not
care 
to hear about it.


MXLogic Mail Admins

2007-11-15 Thread Raymond L. Corbin

Hello,

Is any MXLogic Mail admins subscribed to this list, or anyone who has a contact 
inside MXLogic that can contact me off list? Multiple outbound gateways have 
been having problems with the MXLogic inbound servers over the past few days 
and the tier1 support continues to say that our IP's are not on their 
blacklists and that there shouldn't be anything wrong.

Thanks for the help!

-Ray


Any Comcast Mail/Sysadmins?

2007-10-09 Thread Raymond L. Corbin
Hey,
 
I'm having a few deliverability issues to a few comcast mail gateways.
Is there any comcast mail/sys admins here or anyone who can get me in
contact with them off list? It would be greately appreciated.
 
Thanks for the help!
 
-Ray


RE: DDoS Question

2007-09-27 Thread Raymond L. Corbin

Did you check the source IP in the headers? My logs show that they are
coming from a buncha residential IP addresses so its prolly a bot
network doing it. Most of the messages going through our servers with
that have the domain lifeleaksfromyo.com in it which is causing the
messages to fail in our servers. You can always try the rbl that lists a
lot of residential IP's in it...i think it's the PBL from spamhaus. That
would help limit it, and blocking emails with the domain
lifeleaksfromyo.com Other then that I'm out of ideas. What spam
appliance are you using?

Raymond Corbin
HostMySite.com
877.215.4678

 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Martin Hannigan
Sent: Thursday, September 27, 2007 7:32 PM
To: nanog@merit.edu
Subject: DDoS Question


Folks,

I'm receiving about 25K spams per minute with this subject:

Subject: Looking for Sex Tonight? Curtis Blackman

They randomize the name on the subject line. Is this any particular
virus/malware/zombie signature and any suggestion on how to defend
against it besides what I'm already doing (which is all of the
obvious, rbls, spam appliances, hot cocoa, etc.)?

This happened right around the time I started securing the name server
infrastructure with BIND upgrades and recursor/authoritative NS
splitting. :-)

Best,

Marty


RE: Anyone from live.com or hotmail around here?

2007-08-28 Thread Raymond L. Corbin
Hello,

 

I think I posted about this yesterday. Their 'support' got back to me
today with:

 

Thank you for Contacting MSN Hotmail Domain Support.  Unfortunately we
won't be abl;e to provide you with spam samples

 

I assumed this as a canned response. Then I noticed the abl;e. I would
really like to speak with one of the MSN/Hotmail/Live
postmasters/sysadmins. The mailservers are giving a lot of 550 responses
from various servers in our network and the 'support' isn't really
giving me anything to go on.

 

Raymond Corbin

Support Analyst

HostMySite.com

 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Drew Weaver
Sent: Tuesday, August 28, 2007 11:23 AM
To: 'nanog@merit.edu'
Subject: Anyone from live.com or hotmail around here?

 

 

I've been having a very hard time getting a simple question
answered from your postmaster tech support, please hit me off-list.

 

Thanks,

-Drew

 



Any MSN/Live Mail Admin Contacts?

2007-08-27 Thread Raymond L. Corbin

Hello,

I'm experiencing a lot of problems with about 8 of our outbound mail
gateways to the MSN/Live mail servers throughout the day. Are there any
mail/sysadmins on this list, or anyone that can get me in contact with
someone there, as the general postmaster support is less then fourth
coming with information. Anything would be greatly appreciated.

Thanks,

Raymond Corbin
Support Analyst
HostMySite.com


RE: How should ISPs notify customers about Bots (Was Re: DNS Hijacking

2007-07-24 Thread Raymond L. Corbin

Obviously, botnet authors are lazy, and not motivated to do all that
work to do
all that extra stuff, when we're still focusing on the *last*
generation of
use a well-known IRC net for CC bots, and haven't really address the
*current* use a hijacked host running a private IRC net bots yet.


Most 'large' botnets are run of off private IRC servers. Any good IRC
admin would notice when more then 1k 'bots' started joining their
servers. They can look at channel topics and see if it says something
like .scan .advscan etc etc. Theres a whole list of commands the old
RXBot use to do, I'm sure its more advanced then it was two years ago
when I last used IRC. 

http://www.darksun.ws/phatrxbot/rxbot.html

Typically it's the really new kiddies who setup botnets on public IRCD
servers, as the IRC admins don't want the extra traffic caused by the
bots, nor the problems the script kiddies cause. So adding a public
EFNet server to their redirect list wasn't best, however it's simply a
false positive. These bots are very simple to use, and you can simply
find your better 'bots' by checking the ISP it's from and its uptime.
Take that then make it download a preconfigured IRCD such as Unreal and
make it run in the background and you have a private IRCD server to
route your bots to. So it may not be as fruitful if the public IRC
servers are in fact ensuring script kiddies don't live on their
networks, but if they check the packets to see what FQDN they are using
for their botnet then it wouldn't bother me that they change the DNS to
their own 'cleansing' servers. But in doing this it may lead to false
positives such as the problem when the EFNet server got blocked.

Just my thoughts...

Raymond Corbin
Support Analyst
HostMySite.com


RE: San Francisco Power Outage

2007-07-24 Thread Raymond L. Corbin

They should have generators running...I can't foresee any good
datacenter not having multiple generators to keep their customers
servers online with UPS.

-Ray

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Adrian Chadd
Sent: Tuesday, July 24, 2007 7:54 PM
To: Seth Mattinen
Cc: nanog list
Subject: Re: San Francisco Power Outage


On Tue, Jul 24, 2007, Seth Mattinen wrote:

 I have a question: does anyone seriously accept oh, power trouble as
a 
 reason your servers went offline? Where's the generators? UPS? Testing

 said combination of UPS and generators? What if it was important? I 
 honestly find it hard to believe anyone runs a facility like that and 
 people actually *pay* for it.

 If you do accept this is a good reason for failure, why?

Didn't you read? He paid extra for super-reliable power from his
electricity provider..



Adrian



RE: DNS Hijacking by Cox

2007-07-23 Thread Raymond L. Corbin

  On Mon, 23 Jul 2007, Joe Greco wrote:
   I can't help but notice you totally avoided responding to what I
wrote;
   I would have to take this to mean that you know that it is
fundamentally
   unreasonable to expect users to set up their own recursers to work
around
   ISP recurser brokenness (which is essentially what this is).
  
  Its more resonable to expect users to know how to remove bots and
fix 
  their compromised computers?

 No amount of IRC redirection is going to remove bots and fix their
 compromised computers.

... JG

I disagree. A lot of the compromised computers are still using the old
versions of like Phatbot, agobot, rxbot, all of which have the remove
commands. Placing the .remove in the subject line will effectively
remove the bots as they join the channels. The .remove will effectively
completely remove the bot from their computer, not everything else, but
alteast that bot instance is done. Its one way a lot of IRC networks get
rid of the botnets started on their networks, simply glineing them
causes them to keep trying to reconnect. Granted it won't stop the more
experienced script kiddies, but it will certainly stop the ones who use
the preconfigured scripts because they don't know what the soruce code
means. As many have said this is more about numbers. The number of
infected computers within their network used to DDoS and Spam compared
to the number of legitimate IRC users. Unfortunately the number of
zombies outweighs the good.

Raymond Corbin
Support Analyst
HostMySite.com


RE: DNS Hijacking by Cox

2007-07-22 Thread Raymond L. Corbin

Hey

Well I suppose that would get rid of some of the script kiddies bots off of 
their network...

http://www.dslreports.com/forum/remark,12922412
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/55016

Though...I cannot think of another means to achieve their goal. However I 
wonder how they generated what records to point to their servers. Is it simply 
anything with irc.* ? I suppose it would stop the script kiddies if they didn’t 
use their own unique DNS and specified a different port in the config before 
compiling. Typically zombies are set to listen to the topic commands in order 
to either continue a DDoS attack or like scan for other hosts to infect. This 
would prevent the bots from getting a valid command to start scanning or DDoS, 
or in this case .remove would remove the bot from their customers computer 
(unless the default command character was changed), so I suppose it gets what 
they want, DDoS's to not originate in their network + XDCC Bots being created 
from zombies etc etc, credit card, zombie bots can be set to listen for paypal 
information and credit card information etc...but at the same time causing 
problems for their customers who legitimately use IRC. If weighed, I believe 
their problems with DDoS bots is weighted more heavily then the few who 
legitimately use IRC. I suppose they can always use like psyBNC to connect to 
IRC.

I agree with their goal but not really the means they are using reach their 
goal. If they are going to manipulate DNS to do this...how far will they go 
with other problems?


Raymond Corbin
Support Analyst
HostMySite.com


(sorry if it this posted twice...outlook froze on me :( )


-Original Message-
From: [EMAIL PROTECTED] on behalf of Andrew Matthews
Sent: Sun 7/22/2007 5:56 PM
To: nanog@merit.edu
Subject: DNS Hijacking by Cox
 

It looks like cox is hijacking dns for irc servers.


bash2-2.05b$ nslookup
 server 68.6.16.30
Default server: 68.6.16.30
Address: 68.6.16.30#53
 irc.vel.net
Server: 68.6.16.30
Address:68.6.16.30#53

Name:   irc.vel.net
Address: 70.168.71.144




 server ns1.vel.net
Default server: ns1.vel.net
Address: 207.182.224.10#53
 irc.vel.net
Server: ns1.vel.net
Address:207.182.224.10#53

Name:   irc.vel.net
Address: 64.161.255.2

it looks like they are using it to clean drones, when you connect to
their fake irc server you get forced joined into a channel.

#martian_
[INFO]  Channel view for #martian_ opened.
--|YOU (andrew.m) have joined #martian_
=-= Mode #martian_ +nt by localhost.localdomain
=-= Topic for #martian_ is .bot.remove
=-= Topic for #martian_ was set by Marvin_ on Sunday, July 22, 2007 
2:55:02 PM
=-= Topic for #martian_ is .remove
=-= Topic for #martian_ was set by Marvin_ on Sunday, July 22, 2007 
2:55:02 PM
=-= Topic for #martian_ is .uninstall
=-= Topic for #martian_ was set by Marvin_ on Sunday, July 22, 2007 
2:55:02 PM
=-= Topic for #martian_ is !bot.remove
=-= Topic for #martian_ was set by Marvin_ on Sunday, July 22, 2007 
2:55:02 PM
=-= Topic for #martian_ is !remove
=-= Topic for #martian_ was set by Marvin_ on Sunday, July 22, 2007 
2:55:02 PM
=-= Topic for #martian_ is !uninstall
=-= Topic for #martian_ was set by Marvin_ on Sunday, July 22, 2007 
2:55:02 PM
Marvin_   .bot.remove
Marvin_   .remove
Marvin_   .uninstall
Marvin_   !bot.remove
Marvin_   !remove


isn't there a law against hijacking dns? What can i do to persue this?



RE: DNS Hijacking by Cox

2007-07-22 Thread Raymond L. Corbin

I'm still unsure that this is either a good idea or a bad idea...  
changing the DNS can only help until the bots start connecting directly
to IP addresses. Then where do we go? NAT those connections to
elsewhere? It's one of those lovely arms races where things just get
more and more invasive.

I don't foresee the programming of IP addresses instead of IP addresses.
Because if/when they are found and their exploited server is shut down,
their dedicated server turned off for AUP violations etc they will loose
access to all of the bots set to that IP address. This happens a lot and
when it does they simply change the DNS.


And these people have been flamed senseless. I like to think of it as  
a case of the work the blocklists do is excellent and saves many a  
network from being overrun by spam - however there is always  
collateral damage from things like this. The good far outweighs the  
bad however.


I agree. They are at least trying to clean up their network. If they are
having a lot of problems with zombie bots that DDoS / Spam then this is
a good way to stop it, for now. The small group of users can either use
other nameservers or something like psybnc to connect if they want to
get on IRC.

Raymond Corbin
Support Analyst
HostMySite.com

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Steven Haigh
Sent: Sunday, July 22, 2007 9:56 PM
To: nanog@merit.edu
Subject: Re: DNS Hijacking by Cox


Quoting Sean Donelan [EMAIL PROTECTED]:
 On Sun, 22 Jul 2007, William Allen Simpson wrote:
 Comcast still blocks port 25.  And last week, a locally well-known
person
 was blocked from sending outgoing port 25 email to their servers from
her
 home Comcast service.

 MSA port 587 is only 9 years old.  I guess it takes some people longer
 than others to update their practices.  Based on what I know how
 comcast's abuse systems implement their port 25 restrictions, I think
 it is extremely unlikely it was based on other people having her
e-mail
 address in their Outlook programs.

Indeed. There's just not enough info to make anything but wild guesses  
about this.

 Some people complain ISPs refuse to take action about abuse and
 compromised computers on their networks.  On the other hand, people
 complain when ISPs take action about abuse and compromised computers
on
 their networks.  ISPs are pretty much damned if they do, and damned if
 they don't.

Gotta love the techie world :)

 Several ISPs have been redirecting malware using IRC to cleaning
 servers for a couple of years trying to respond to the massive number
 of bots.  On occasion they pick up CC server which also contains some
 legitimate uses. Trying to come up with a good cleaning message for
 each protocol can be a challenge.

I'm still unsure that this is either a good idea or a bad idea...  
changing the DNS can only help until the bots start connecting  
directly to IP addresses. Then where do we go? NAT those connections  
to elsewhere? It's one of those lovely arms races where things just  
get more and more invasive.

In the short term, it's a good thing - the amount of spam I get from  
their network has halved - which is great - however in the long term,  
the writers of this crudware will find another way to do business  
(web? ftp?).

 Yes, false positives and false negatives are always an issue. People
 running sevaral famous block lists for spam and other abuse also made
 mistakes on occasion.

And these people have been flamed senseless. I like to think of it as  
a case of the work the blocklists do is excellent and saves many a  
network from being overrun by spam - however there is always  
collateral damage from things like this. The good far outweighs the  
bad however.

-- 
Steven Haigh

Email: [EMAIL PROTECTED]
Web: http://www.crc.id.au
Phone: (03) 9017 0597 - 0404 087 474



RE: Earthlink NOC Contact Info

2007-07-18 Thread Raymond L. Corbin

Hey,

I believe I had this problem before as well. There was that and a few
other problems with earthlinks mailservers. I'll contact you off list
with the information that I could have about them, but you may need to
go through their corporate relations dept first as they give the 'no one
can talk to our postmaster team' speech.

Raymond Corbin
Support Analyst
HostMySite.com



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Jason J. W. Williams
Sent: Wednesday, July 18, 2007 5:05 PM
To: nanog@merit.edu
Subject: Earthlink NOC Contact Info


Hello,

We're having some serious issues with Earthlink's mail servers
connecting 8-10 times to our servers to send a single message. The
target is one of our e-mail security customers and really need to get in
touch with the Earthlink NOC to find out why they are retrying when we
are successfully accepting the message. Unfortunately, the NOC number's
been removed from puck.net, and after being shuffled to 4 different
departments at Earthlink we're being told to e-mail [EMAIL PROTECTED]
We've been trying to get this resolved for 6 months with Earthlink
([EMAIL PROTECTED]) and its to a pain point where really do need to
resolve the issue.

If anyone could point us in the right direction, or if you're with
Earthlink contact us off-list it would be really great. Thank you in
advance.

Best Regards,
Jason Williams
DigiTar Support
[EMAIL PROTECTED]