-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On onsdag, nov 26, 2003, at 07:44 Europe/Stockholm, Simon Lockhart
wrote:
On Tue Nov 25, 2003 at 08:32:50PM -0500, David Lesher wrote:
Is there not sizeable UK-FR capacity through the Chunnel?
Yes, I believe there's a sizable amount of fiber
telling spammers 4xx or 5xx doesn't matter, they don't listen.
On Mon, Dec 01, 2003 at 09:18:21PM +0100, Daniel Roesen wrote:
On Mon, Dec 01, 2003 at 12:52:28PM -0700, Michael Lewinski wrote:
The idea is to punish spammers by filling up their queues, although
honestly I don't know of any
[EMAIL PROTECTED] wrote:
Why on earth would Verizon need to do the lookup once per
incoming email? If they need to verify that a given MX
does indeed exist and is reachable and is running an
SMTP server, then why not cache that info for some
Er.. they are not looking for MX exists. If MX
On Tue, 02 Dec 2003 14:37 UTC Suresh Ramasubramanian
[EMAIL PROTECTED] wrote:
| Nobody except spammers / dictionary attackers seem to VRFY these days
| for this sort of stuff. In fact grepping your logs for VRFY is often
| a reliable sign of a dictionary attack on your machines.
VRFY is an
Richard Cox writes on 12/2/2003 9:57 AM:
VRFY is an (unavoidable) part of the checking routine built into the
popular Sam Spade for Windows client, for manual verification of any
suspect addresses found to have sent suspicious mail. So just looking
for VRFY can give you some, er, false
telling spammers 4xx or 5xx doesn't matter, they don't listen.
yes, but interestingly, every smtp transport (remote ip address who
connects to your tcp/25 service) who ignores 5XX (which you can tell
because they come back and try the same thing again over and over) is
either a spammer or the
Just a heads up for those who use
http://ftp.apnic.net/stats/apnic/apnic-latest
It moved. If you have scripts that slurp APNIC ASN or IPv4 allocations,
they probably broke this morning.
The new correct link is at
http://ftp.apnic.net/stats/apnic/new/delegated-apnic-latest
Exactly this is the flawed point about returning 4xx. They produce
only collateral damage, but don't hit their target at all.
but they can feel self-righteous, which is probably the major goal
I really hate doing this but after 5 days and no one at AOL's helpdesk can even
tell me why our subnets are being blocked. Can someone with the Postmaster
helpdesk level 2 or higher please contact me. I have a ticket, I have followed
all the rules, and I am still being told that no one knows why
Hi All
The topic Spam sent over infected or malconfigured enduser pc's
will become an big issue. We saw Virus' sending Spam directly from
the users pc, downloading the recipient list and the payload trough
HTTP from the web.
How will you deal with the problem, that one user can flood your
SMTP
Interstingly enough, the FTP url hasnt changed:
http://ftp.apnic.net/stats/apnic/apnic-latest
there are some strange differences between the http version and
the ftp version.
I have some automated stuff that grabs the data once a week and makes
it available in an actually-human-usable format
(susan, this is in a spam related thread but i'm adding offtopic remarks
which i think are actually in-charter for nanog. --pv)
Verizon does SMTP callbacks, connecting back to the MX of the envelope
sender and trying to verify that the user exists
while something like RMX or MAILFROM would
Does anyone have some objective performance tests of Cogent and Broadwing?
Or any insight into eithers peering and peer relationships or ideas of how
they route traffic?
Thanks.
--
matthew zeier - Curiosity is a willing, a proud, an eager confession
of ignorance. - Leonard Rubenstein
Hi,
...on Tue, Dec 02, 2003 at 07:23:41PM +0800, Suresh Ramasubramanian wrote:
What they are trying to do is to connect back
to email.com's MXs and ensure that the user
[EMAIL PROTECTED] who is trying to
send them mail really does exist, [..]
It does tend to cut down on the amount
Thanks to all who responded to my query. I suppose I should have added
that the brass in my company are somewhat loathe to work a little harder
at things like using SecurID tokens, firing up VPN software, etc. I want
a single login solution is a common mantra on the top floor. OK, OK,
we're
Hi all -
You may have heard that there will be a new one-day track on Peering and
Internet Exchanges at the upcoming APRICOT in Kuala Lumpur in February. I'd
like to describe the track in brief and solicit a few more Peering
Coordinators / Network Architects / Network Engineers as speakers for
Michel Renfer writes on 12/2/2003 12:50 PM:
How will you deal with the problem, that one user can flood your
SMTP Server with tousends of emails within 10-20 minutes?
Virus filtering
Rate limit (+ script to auto terminate user) and smtp auth on outbounds
Separate inbound and outbound smtp
On Tue, 02 Dec 2003 20:05:47 +0100, Alexander Bochmann [EMAIL PROTECTED] said:
I agree that much of the anti-spam stuff out there
is kludgy at best, and often harmful to other users,
but let's not forget that it's the spammers who make
all this necessary...
Today's stupid spammer trick:
- Original Message -
From: Suresh Ramasubramanian [EMAIL PROTECTED]
To: Michel Renfer [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Tuesday, December 02, 2003 2:23 PM
Subject: Re: SPAM from own customers
Virus filtering
Rate limit (+ script to auto terminate user) and smtp auth on
Alexander Bochmann writes on 12/2/2003 2:05 PM:
If some of the large Email providers like Outblaze,
Hotmail, Yahoo, AOL, etc. could agree on a more
integrated approach to implement at least some form
of sender authorization - possibly in the line of the
RMX RR draft[1] - as a service to the
Ask AOL for an [EMAIL PROTECTED] feed - a lot of these trojan spams seem to
target AOL users.
Something to be aware of with the AOL scomp feed...any time one of your
users sends a message with no To address, and everyone in the BCC or CC
fields, it will generate a notification to the e-mail
On Tue, 2 Dec 2003 14:32:16 -0500 Brian Bruns [EMAIL PROTECTED] wrote:
SMTP AUTH is becoming risky if its not carefully setup and monitored. I can
name one big time spammer who has warmed up to cracking weak passwords on
e-mail systems that do SMTP AUTH. Means you'd have to filter your
Could someone from Road Runner's abuse department contact 407-482-8487 or
ghadlockatepik(dotnet please.
Shane
Hello List,
thank you all for your replies and kindness to help us.
I looked for dialup connectivity in Finland. The choice went
to TeliaSonera. Thank's to the guys out there.
--
Best regards,
frankmailto:[EMAIL PROTECTED]
Michel Renfer wrote:
Hi All
The topic Spam sent over infected or malconfigured enduser pc's
will become an big issue. We saw Virus' sending Spam directly from
the users pc, downloading the recipient list and the payload trough
HTTP from the web.
How will you deal with the problem, that one user
Hi,
I'm looking for input about how other people deal with this problem:
We generate prefix filters for our customers from RADB using their AS
or as-set. Our upstreams do the same for us.
Our filters are generated with a simple WHOIS query and will pick up
objects not only from RADB but from
I've searched the archives and find some hits on DS-1 test gear, but I'm
looking for opinions/experience with DS-3 test gear.
We've started bringing up more DS-3 circuits, both directly to customers and
also for Frame/ATM/DSL aggregation. Telco used to do all provisioning and
testing for us,
At 9:06 PM -0500 11/26/03, David Lesher wrote:
Speaking on Deep Background, the Press Secretary whispered:
My company is investigating the use of wireless in a couple of our
conference rooms. Aside from limiting the scope of reception with various
directional antennae, does anyone have any
At 9:51 PM -0500 11/26/03, Sean Donelan wrote:
On Wed, 26 Nov 2003, David Lesher wrote:
Speaking on Deep Background, the Press Secretary whispered:
My company is investigating the use of wireless in a couple of our
conference rooms. Aside from limiting the scope of reception with various
Howard C. Berkowitz wrote:
Stupid pen-test tricks, instead of using an expensive WiFi scanner and
cracking WEP; often you can collect better intelligence with a radio
turned to the frequency used by wireless lapel mics used by executives
during briefings.
Or by lecturers forgetting them
On Tue, 2 Dec 2003, Phillip Vandry wrote:
Hi,
I'm looking for input about how other people deal with this problem:
We generate prefix filters for our customers from RADB using their AS
or as-set. Our upstreams do the same for us.
Our filters are generated with a simple WHOIS query and
I have been looking into the Cisco Aironet solution recently for
a project I'm working on. They seem to have some great security
features, if you want to take the time to configure it. Oh, another
caveat is that you have to use Cisco's wireless adapter as well,
otherwise, good ol' WEP
by this vulnerability. No other Cisco product is affected.
This advisory will be available at
http://www.cisco.com/warp/public/707/cisco-sa-20031202-SNMP-trap.shtml
I haven't thought of the VPN idea that others have spoken of on
the NANOG list yet...that's a good idea too...hmm
- Erik
On Tue, 2 Dec 2003, Derrick Bennett wrote:
I really hate doing this but after 5 days and no one at AOL's helpdesk
can even tell me why our subnets are being blocked. Can someone with the
Postmaster helpdesk level 2 or higher please contact me. I have a
ticket, I have followed all the rules,
Does anyone know the secret to contacting a dark fiber salesperson
at Level 3? The website directs a prospect to their toll free number
1-877-2LEVEL3 but the voicemail decision tree has some very dead
limbs.
It's not always easy to convey one's frustration in email. But the
mugshot in this story
35 matches
Mail list logo