Re: Abuse procedures... Reality Checks

2007-04-13 Thread J. Oquendo
Last post for me on this thread... Dirty Networking 101 So the other morning I found a contact for a company who'll for now remain unamed, this contact is on this group...Sent them yet another message (3 this week): new message To whom it may concern, One of my servers has been heavily under

Re: Abuse procedures... Reality Checks

2007-04-13 Thread Rich Kulawiec
On Sat, Apr 07, 2007 at 05:12:19PM -0500, Frank Bulk wrote: If they're properly SWIPed why punish the ISP for networks they don't even punish? Since when is it punishment to refuse to extend a privilege that's been repeatedly and systematically abused? (You have of course, absolutely no right

Re: Abuse procedures... Reality Checks

2007-04-13 Thread Steve Sobol
On Fri, 13 Apr 2007, Rich Kulawiec wrote: Since when is it punishment to refuse to extend a privilege that's been repeatedly and systematically abused? It IS punishment if it's in response to some sort of undesired behavior, but it probably isn't UNJUSTIFIED punishment. -- Steve Sobol,

RE: Abuse procedures... Reality Checks

2007-04-12 Thread Mikael Abrahamsson
On Wed, 11 Apr 2007, Frank Bulk wrote: It truly is a wonder that Comcast doesn't apply DOCSIS config file filters on their consumer accounts, leaving just the IPs of their email servers open. Yes, it would take an education campaign on their part for all the consumers that do use alternate

Re: Abuse procedures... Reality Checks

2007-04-12 Thread Leigh Porter
Mikael Abrahamsson wrote: On Wed, 11 Apr 2007, Frank Bulk wrote: It truly is a wonder that Comcast doesn't apply DOCSIS config file filters on their consumer accounts, leaving just the IPs of their email servers open. Yes, it would take an education campaign on their part for all the

RE: Abuse procedures... Reality Checks

2007-04-12 Thread Fernando André
Citando Frank Bulk [EMAIL PROTECTED]: but imagine how much work it would save their abuse department in the long run I think that Comcast trouble isn't has much has the company's affected I keep the idea that the best is to rate limit incoming connections and a lot of filtering to prevent

Re: Abuse procedures... Reality Checks

2007-04-12 Thread Kradorex Xeron
On Thursday 12 April 2007 06:14, Fernando André wrote: Citando Frank Bulk [EMAIL PROTECTED]: but imagine how much work it would save their abuse department in the long run I think that Comcast trouble isn't has much has the company's affected I keep the idea that the best is to rate

Re: Abuse procedures... Reality Checks

2007-04-11 Thread J. Oquendo
Stephen Satchell wrote: SWIPs are required for reallocations of /29 and larger if the allocation owner does not operate a RWhoIs server. Of course, SWIP is a ARIN thing, and you work for BRITISH TELECOMMUNICATIONS PLC. As a US network operator, I was well aware of the requirements for

RE: Abuse procedures... Reality Checks

2007-04-11 Thread michael.dillon
SWIP is a process used by organizations to submit information about downstream customer's address space reassignments to ARIN for inclusion in the WHOIS database. Its goal is to ensure the effective and efficient maintenance of records for IP address space. Lovely language but it

RE: Abuse procedures... Reality Checks

2007-04-11 Thread michael.dillon
Maybe ARIN staff should start re-writing policies and implementing out punishments. Guarantee you if operators were penalized for not following rules, for allowing filth to leave their networks, I bet you many maladies on the net would be cut substantially. Sorry, that's not their job.

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Valdis . Kletnieks
On Wed, 11 Apr 2007 07:07:19 EDT, J. Oquendo said: these so called rules? Many network operators are required to do a lot of things, one of these things should be the mitigation of malicious traffic from LEAVING their network. And I want a pony. We don't even do a (near) universal job of

Re: Abuse procedures... Reality Checks

2007-04-11 Thread J. Oquendo
[EMAIL PROTECTED] wrote: * PGP Signed by an unverified key: 04/11/07 at 11:21:15 On Wed, 11 Apr 2007 07:07:19 EDT, J. Oquendo said: these so called rules? Many network operators are required to do a lot of things, one of these things should be the mitigation of malicious traffic from

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Warren Kumari
On Apr 11, 2007, at 11:28 AM, J. Oquendo wrote: [EMAIL PROTECTED] wrote: * PGP Signed by an unverified key: 04/11/07 at 11:21:15 On Wed, 11 Apr 2007 07:07:19 EDT, J. Oquendo said: these so called rules? Many network operators are required to do a lot of things, one of these things should

Re: Abuse procedures... Reality Checks

2007-04-11 Thread J. Oquendo
Warren Kumari wrote: So, I have always wondered -- how do you customers really react when they can no longer reach www.example.com, a site hosted a few IPs away from www.badevilphisher.net? And do you really think that you blocking them is going to make example.com contact their provider to

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Scott Weeks
into the hundreds of thousands of customers and can only imagine the big ass eyeball network's scalability issues... scott --- [EMAIL PROTECTED] wrote: From: J. Oquendo [EMAIL PROTECTED] To: nanog@merit.edu Cc: Warren Kumari [EMAIL PROTECTED] Subject: Re: Abuse procedures... Reality Checks Date

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Warren Kumari
[EMAIL PROTECTED] Subject: Re: Abuse procedures... Reality Checks Date: Wed, 11 Apr 2007 13:49:40 -0400 Warren Kumari wrote: So, I have always wondered -- how do you customers really react when they can no longer reach www.example.com, a site hosted a few IPs away from www.badevilphisher.net

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Douglas Otis
On Apr 11, 2007, at 10:32 AM, Warren Kumari wrote: Perhaps you could write a nice, simple, friendly guide explaining how you ensure that your network is never the source of malicious traffic? Identify your ownership, and ensure contact information is accurate and well attended.

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Rich Kulawiec
On Tue, Apr 10, 2007 at 07:44:59AM -0500, Frank Bulk wrote: Comcast is known to emit lots of abuse -- are you blocking all their networks today? All? No. But I shouldn't find it necessary to block ANY, and wouldn't, if Comcast wasn't so appallingly negligent. ( I'm blocking huge swaths of

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Rich Kulawiec
On Wed, Apr 11, 2007 at 03:44:01PM -0400, Warren Kumari wrote: The same thing happens with things like abuse -- it is easy to deal with abuse on a small scale. It is somewhat harder on a medium scale and harder still on a large scale -- the progression from small to medium to large is

RE: Abuse procedures... Reality Checks

2007-04-11 Thread michael.dillon
As for documentation on this... There is PLENTY of it. Why should I write another document no one would follow. Because you might be a better writer than those other folks. You might be able to present the right balance of technical detail and policy goals to be understood by a larger number

RE: Abuse procedures... Reality Checks

2007-04-11 Thread michael.dillon
I know from experience this doesn't scale into the hundreds of thousands of customers and can only imagine the big ass eyeball network's scalability issues... Hear hear... Scaling process and procedures is often as hard or harder than scaling technical things... It's true. But

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Scott Weeks
--- [EMAIL PROTECTED] wrote: On Wed, Apr 11, 2007 at 03:44:01PM -0400, Warren Kumari wrote: The same thing happens with things like abuse -- it is easy to deal with abuse on a small scale. It is somewhat harder on a medium scale and harder still on a large scale -- the progression from

RE: Abuse procedures... Reality Checks

2007-04-11 Thread Frank Bulk
it would save their abuse department in the long run. Frank -Original Message- From: Frank Bulk Sent: Wednesday, April 11, 2007 5:10 PM To: 'nanog@merit.edu' Subject: Re: Abuse procedures... Reality Checks On Tue, Apr 10, 2007 at 07:44:59AM -0500, Frank Bulk wrote: Comcast is known to emit

RE: Abuse procedures... Reality Checks

2007-04-10 Thread michael.dillon
I have to disagree. SWIP is not meaningless. In my company some functions related to sending a SWIP are automated, but my company has people on staff who know that it is happening and what it means. And I talk with plenty of other companies that fall into the same boat. In

Re: Abuse procedures... Reality Checks

2007-04-10 Thread Rich Kulawiec
On Sat, Apr 07, 2007 at 09:50:34PM +, Fergie wrote: I would have to respectfully disagree with you. When network operators do due diligence and SWIP their sub-allocations, they (the sub-allocations) should be authoritative in regards to things like RBLs. After thinking it over: I

Re: Abuse procedures... Reality Checks

2007-04-10 Thread Rich Kulawiec
On Sat, Apr 07, 2007 at 04:20:59PM -0500, Frank Bulk wrote: Define network operator: the AS holder for that space or the operator of that smaller-than-slash-24 sub-block? If the problem consistently comes from /29 why not just leave the block in and be done with it? Because

RE: Abuse procedures... Reality Checks

2007-04-10 Thread Frank Bulk
Comcast is known to emit lots of abuse -- are you blocking all their networks today? Frank -Original Message- From: Frank Bulk Sent: Tuesday, April 10, 2007 7:43 AM To: nanog@merit.edu Subject: Re: Abuse procedures... Reality Checks On Sat, Apr 07, 2007 at 09:50:34PM +, Fergie

RE: Abuse procedures... Reality Checks

2007-04-10 Thread michael.dillon
Because I haven't got unlimited WHOIS queries. (Although I and everyone else *should* have those. There are no valid reasons to rate-limit any form of WHOIS query.) Yes there are. The current whois returns way more information on a query than you need for network operations. That's

Re: Abuse procedures... Reality Checks

2007-04-10 Thread Joseph S D Yao
On Tue, Apr 10, 2007 at 03:11:31PM +0100, [EMAIL PROTECTED] wrote: ... Yes there are. The current whois returns way more information on a query than you need for network operations. That's because the current whois was designed back in the 1970's so that ARPANET network managers could

Re: Abuse procedures... Reality Checks

2007-04-10 Thread Joseph S D Yao
On Tue, Apr 10, 2007 at 10:30:32AM +0100, [EMAIL PROTECTED] wrote: ... I also find it curious that you claim to have people on staff at your company who know what SWIP means. Perhaps you could ask them to share that information with us since I have never seen this documented anywhere. Do they

Re: Abuse procedures... Reality Checks

2007-04-10 Thread Stephen Satchell
[EMAIL PROTECTED] wrote: I also find it curious that you claim to have people on staff at your company who know what SWIP means. Perhaps you could ask them to share that information with us since I have never seen this documented anywhere. Do they really know what you claim they know?

Re: Abuse procedures... Reality Checks

2007-04-09 Thread J. Oquendo
Pete Templin wrote: John R Levine wrote: I don't have PI space, but I do have a competent ISP so I've never had any mail problems due to adjacent addresses. Having a competent ISP isn't a guarantee of exemption...only a contributor. As evidenced by the discussion, some people choose the

Re: Abuse procedures... Reality Checks

2007-04-09 Thread John L
I don't have PI space, but I do have a competent ISP so I've never had any mail problems due to adjacent addresses. Having a competent ISP isn't a guarantee of exemption...only a contributor. As evidenced by the discussion, some people choose the scope of their wrath arbitrarily. Nothing

Re: Abuse procedures... Reality Checks

2007-04-09 Thread Chris Owen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Apr 9, 2007, at 1:49 PM, John L wrote: I don't have PI space, but I do have a competent ISP so I've never had any mail problems due to adjacent addresses. Having a competent ISP isn't a guarantee of exemption...only a contributor. As

RE: Abuse procedures... Reality Checks

2007-04-09 Thread michael.dillon
I would have to respectfully disagree with you. When network operators do due diligence and SWIP their sub-allocations, they (the sub-allocations) should be authoritative in regards to things like RBLs. How do you tell when they have actually done due diligence. Existence of a SWIP record

RE: Abuse procedures... Reality Checks

2007-04-09 Thread Frank Bulk
like a good idea, but I'm guessing few network operators do that for their customer networks, whether that's due to lack of centralization or cost. Frank -Original Message- From: Frank Bulk Sent: Monday, April 09, 2007 3:49 PM To: 'nanog@merit.edu' Subject: RE: Abuse procedures... Reality

RE: Abuse procedures... Reality Checks

2007-04-09 Thread Chris L. Morrow
On Mon, 9 Apr 2007 [EMAIL PROTECTED] wrote: If they're properly SWIPed why punish the ISP for networks they don't even operate, that obviously belong to their business customers? How can you tell that they don't operate a network from SWIP records? Seems to me that lots of network

RE: Abuse procedures... Reality Checks

2007-04-09 Thread Frank Bulk
: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Pete Templin Sent: Monday, April 09, 2007 3:42 PM To: Chris Owen Cc: nanog@merit.edu Subject: Re: Abuse procedures... Reality Checks Chris Owen wrote: Well, well managed to me would mean that allocations from that /20 were SWIPed or a rwhois

RE: Abuse procedures... Reality Checks

2007-04-09 Thread Azinger, Marla
procedures... Reality Checks I would have to respectfully disagree with you. When network operators do due diligence and SWIP their sub-allocations, they (the sub-allocations) should be authoritative in regards to things like RBLs. How do you tell when they have actually done due diligence

Re: Abuse procedures... Reality Checks

2007-04-09 Thread Valdis . Kletnieks
On Mon, 09 Apr 2007 17:11:28 EDT, Azinger, Marla said: In my company some functions related to sending a SWIP are automated, but my company has people on staff who know that it is happening and what it means. Just because *your* site has enough clue to get it right doesn't mean that the

Re: Abuse procedures... Reality Checks

2007-04-09 Thread Chris Owen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Apr 9, 2007, at 3:41 PM, Pete Templin wrote: Chris Owen wrote: Well, well managed to me would mean that allocations from that / 20 were SWIPed or a rwhois server was running so that if any of

Re: Abuse procedures... Reality Checks

2007-04-09 Thread Douglas Otis
On Apr 8, 2007, at 9:03 PM, Paul Vixie wrote: [EMAIL PROTECTED] (Douglas Otis) writes: Good advise. For various reasons, a majority of IP addresses within a CIDR of any size being abusive is likely to cause the CIDR to be blocked. While a majority could be considered as being half

Re: Abuse procedures... Reality Checks

2007-04-09 Thread Christopher X. Candreva
On Mon, 9 Apr 2007, Paul Vixie wrote: than you're describing. for example, this weekend two /24's were hijacked and used for spam spew. as my receivebot started blackholing /32's, the Why do you think they were hijacked ? At least for your second block: 1 71.6.213.103 I've

Re: Abuse procedures... Reality Checks

2007-04-08 Thread Paul Vixie
Neither I nor J. Oquendo nor anyone else are required to spend our time, our money, and our resources figuring out which parts of X's network can be trusted and which can't. you should only spend resources on activities which will benefit you, of course. research into a /N to find out

Re: Abuse procedures... Reality Checks

2007-04-08 Thread Leo Vegoda
On Apr 7, 2007, at 11:27 PM, John Levine wrote: [...] I can assure you from experience that any sort of automated RIR WHOIS lookups will quickly trip volume checks and get you blocked, Does this happen when you only query for the network information and not the full contact information?

RE: Abuse procedures... Reality Checks

2007-04-08 Thread Barry Shein
[EMAIL PROTECTED] Subject: RE: Abuse procedures... Reality Checks Date: Sat, 7 Apr 2007 16:20:59 -0500 If they can't hold the outbound abuse down to a minimum, then I guess I'll have to make up for their negligence on my end. Sure, block that /29, but why block the /24, /20

Re: Abuse procedures... Reality Checks

2007-04-08 Thread Paul Vixie
[EMAIL PROTECTED] (Douglas Otis) writes: Good advise. For various reasons, a majority of IP addresses within a CIDR of any size being abusive is likely to cause the CIDR to be blocked. While a majority could be considered as being half right, the existence of the bad neighborhood

RE: Abuse procedures... Reality Checks

2007-04-07 Thread Frank Bulk
Joe: I understand your frustration and appreciate your efforts to contact the sources of abuse, but why indiscriminately block a larger range of IPs than what is necessary? Here's the /24 in question: Combined Systems Technologies NET-CST (NET-207-177-31-0-1) 207.177.31.0 -

Re: Abuse procedures... Reality Checks

2007-04-07 Thread J. Oquendo
On Sat, 07 Apr 2007, Frank Bulk wrote: Joe: I understand your frustration and appreciate your efforts to contact the sources of abuse, but why indiscriminately block a larger range of IPs than what is necessary? Far too many times I've tried to contact those who have the DIRECT

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Rich Kulawiec
On Sat, Apr 07, 2007 at 02:31:25PM -0500, Frank Bulk wrote: I understand your frustration and appreciate your efforts to contact the sources of abuse, but why indiscriminately block a larger range of IPs than what is necessary? 1. There's nothing indiscriminate about it. I often block

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Peter Dambier
J. Oquendo wrote: ... So to answer your question about fairness... It's not fair by any means, but it is effective. I see it as follows... Well, that's the reason why I have a gmail account and all my customers have. I can send even from my dynamic ip-address and still they let me in. They

RE: Abuse procedures... Reality Checks

2007-04-07 Thread Frank Bulk
On Sat, Apr 07, 2007 at 02:31:25PM -0500, Frank Bulk wrote: I understand your frustration and appreciate your efforts to contact the sources of abuse, but why indiscriminately block a larger range of IPs than what is necessary? 1. There's nothing indiscriminate about it. I often

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Chris Owen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Apr 7, 2007, at 4:20 PM, Frank Bulk wrote: Sure, block that /29, but why block the /24, /20, or even /8? Perhaps your (understandable) frustration is preventing you from agreeing with me on this specific case. Because what you usually see

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Fergie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Rich Kulawiec [EMAIL PROTECTED] wrote: 1. There's nothing indiscriminate about it. I often block /24's and larger because I'm holding the *network* operators responsible for what comes out of their operation. If they can't hold the outbound

Re: Abuse procedures... Reality Checks

2007-04-07 Thread william(at)elan.net
On Sat, 7 Apr 2007, Fergie wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Rich Kulawiec [EMAIL PROTECTED] wrote: 1. There's nothing indiscriminate about it. I often block /24's and larger because I'm holding the *network* operators responsible for what comes out of their

RE: Abuse procedures... Reality Checks

2007-04-07 Thread Frank Bulk
to have clean customers. Frank -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of william(at)elan.net Sent: Saturday, April 07, 2007 5:58 PM To: Fergie Cc: [EMAIL PROTECTED]; nanog@merit.edu Subject: Re: Abuse procedures... Reality Checks On Sat, 7 Apr 2007

RE: Abuse procedures... Reality Checks

2007-04-07 Thread william(at)elan.net
of every one of those subblocks did not lead to any results. Frank -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of william(at)elan.net Sent: Saturday, April 07, 2007 5:58 PM To: Fergie Cc: [EMAIL PROTECTED]; nanog@merit.edu Subject: Re: Abuse procedures

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Fergie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- william(at)elan.net [EMAIL PROTECTED] wrote: On Sat, 7 Apr 2007, Fergie wrote: I would have to respectfully disagree with you. When network operators do due diligence and SWIP their sub-allocations, they (the sub-allocations) should be

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Stephen Satchell
Frank Bulk wrote: [[Attribution deleted by Frank Bulk]] Neither I nor J. Oquendo nor anyone else are required to spend our time, our money, and our resources figuring out which parts of X's network can be trusted and which can't. It's not that hard, the ARIN records are easy to look up.

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Fergie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Stephen Satchell [EMAIL PROTECTED] wrote: It's *very* hard to do it with an automated system, as such automated look-ups are against the Terms of Service for every single RIR out there. Exactly why is this hard to do? I would think that

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Chris Owen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Apr 7, 2007, at 11:00 PM, Fergie wrote: I would think that it's actually very easy to do when sub-allocations are SWIP'ed. Not that I'm really defending this policy, but sub-allocations are very often not SWIPed. I'd say 75% or more of the

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Fergie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Chris Owen [EMAIL PROTECTED] wrote: On Apr 7, 2007, at 11:00 PM, Fergie wrote: I would think that it's actually very easy to do when sub-allocations are SWIP'ed. Not that I'm really defending this policy, but sub-allocations are very

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Chris Owen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Apr 7, 2007, at 11:41 PM, Fergie wrote: Please read what I wrote: I would think that it's actually very easy to do when sub-allocations are SWIP'ed. I cannot, and will not, presuppose that in cases when they are not SWIP'ed that some kind of

RE: Abuse procedures... Reality Checks

2007-04-07 Thread Frank Bulk
[mailto:[EMAIL PROTECTED] Sent: Saturday, April 07, 2007 5:44 PM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: Abuse procedures... Reality Checks Frank Bulk wrote: [[Attribution deleted by Frank Bulk]] Neither I nor J. Oquendo nor anyone else are required to spend our time, our

RE: Abuse procedures... Reality Checks

2007-04-07 Thread Frank Bulk
@merit.edu Subject: RE: Abuse procedures... Reality Checks On Sat, 7 Apr 2007, Frank Bulk wrote: If they're properly SWIPed why punish the ISP for networks they don't even operate, that obviously belong to their business customers? All ISPs have AUPs that prohibit spam (or at least I hope all of you

RE: Abuse procedures... Reality Checks

2007-04-07 Thread Robert Bonomi
From: Frank Bulk [EMAIL PROTECTED] Subject: RE: Abuse procedures... Reality Checks Date: Sat, 7 Apr 2007 16:20:59 -0500 If they can't hold the outbound abuse down to a minimum, then I guess I'll have to make up for their negligence on my end. Sure, block that /29, but why block

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Dave Pooser
BLUNT QUESTIONS: *WHO* pays me to figure out 'which parts' of a provider's network are riddled with problems and 'which parts' are _not_? I don't know the answer in your case, but in my case the answer is my employer. More specifically, my employer pays me to block junk and let good traffic*

RE: Abuse procedures... Reality Checks

2007-04-07 Thread Frank Bulk
@merit.edu Subject: RE: Abuse procedures... Reality Checks From: Frank Bulk [EMAIL PROTECTED] Subject: RE: Abuse procedures... Reality Checks Date: Sat, 7 Apr 2007 16:20:59 -0500 If they can't hold the outbound abuse down to a minimum, then I guess I'll have to make up for their negligence

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Fergie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Chris Owen [EMAIL PROTECTED] wrote: On Apr 7, 2007, at 11:41 PM, Fergie wrote: Please read what I wrote: I would think that it's actually very easy to do when sub-allocations are SWIP'ed. I cannot, and will not, presuppose that in cases

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Chris Owen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Apr 8, 2007, at 2:51 AM, Fergie wrote: Again, a simple recursive WHOIS will show you sub-allocations if they are properly SWIP'ed. Define properly. The Cox addresses in my example are SWIPed. Are they properly SWIPed? How could you tell

Re: Abuse procedures... Reality Checks

2007-04-07 Thread John Levine
Sure, block that /29, but why block the /24, /20, or even /8? Since nobody will route less than a /24, you can be pretty sure that regardless of the SWIPs, everyone in a /24 is served by the same ISP. I run a tiny network with about 400 mail users, but even so, my semiautomated systems are

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Fergie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Chris Owen [EMAIL PROTECTED] wrote: On Apr 8, 2007, at 2:51 AM, Fergie wrote: Again, a simple recursive WHOIS will show you sub-allocations if they are properly SWIP'ed. Define properly. The Cox addresses in my example are SWIPed. Are

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Matthew Black
On Sat, 7 Apr 2007 20:41:19 -0500 (CDT) Robert Bonomi [EMAIL PROTECTED] wrote: BLUNT QUESTIONS: *WHO* pays me to figure out 'which parts' of a provider's network are riddled with problems and 'which parts' are _not_? *WHO* pays me to do the research to find out where the end-user

RE: Abuse procedures... Reality Checks

2007-04-07 Thread Frank Bulk
it, block *all* the IPs associated to the 'bad' ISP. Then at least you're consistent, otherwise expanding to a /24 is just a half (or 1%) job or laziness. Frank -Original Message- From: Frank Bulk Sent: Saturday, April 07, 2007 10:45 PM To: [EMAIL PROTECTED] Subject: Re: Abuse procedures

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Mikael Abrahamsson
On Sat, 7 Apr 2007, Chris Owen wrote: And how do you know the difference? The Cox IP address is SWIPed. Its even sub-allocated. The allocation is just a /19. Exactly, so why not just block whatever the suballocation is? Would mean that companies that properly SWIP their IP-blocks and put