RE: DNS Based Load Balancers

2006-07-05 Thread Joseph Jackson
Title: RE: DNS Based Load Balancers






What would be a better solution then?

-Original Message-
From:  Lincoln Dale [mailto:[EMAIL PROTECTED]]
Sent: Tue Jul 04 18:30:00 2006
To: 'Rodrick Brown'; 'Sam Stickland'
Cc: 'Matt Ghali'; 'Patrick W. Gilmore'; nanog@merit.edu
Subject: RE: DNS Based Load Balancers


 As someone who has also deployed GSLB's with hardware applicances I
 would also like to know real world problems and issues people are
 running into today on modern GSLB implementations and not
 theoretical ones, as far as I can tell our GSLB deployment was very
 straight forward and works flawlessly.

GSLB based on DNS have one significant shortcoming that moone here has yet
mentioned: they are performing their magic on the location of the
_nameserver_ that issued the query.

this can be VERY different to that of the ACTUAL location of the client.

for example, Akamai always sends to off to a serverfarm in Northern
California, because that's where my DNS query is originating from.

that is almost the exact opposite side of the planet from where I'm coming
from...
irony is that there is an akamai cluster about 10 feet away from where my
[subsequent] http requests originate from...

sure - perhaps this isn't the norm - split-tunnel VPNs being what they are -
but it's a perfect example of why GSLB based on DNS ain't perfect.



cheers,

lincoln.







RE: DNS Based Load Balancers

2006-07-05 Thread Lincoln Dale

  but it's a perfect example of why GSLB based on DNS ain't perfect.
  What would be a better solution then?

utopia would be for DNS to be enhanced in some manner such that the 'end
user ip-address' became visible in the DNS request.
utopia would have NAT devices which actually updated that in-place so an
authoritive nameserver always authoritively _knew_ the public ip-address of
where the request was coming from.

alas, we don't live in utopia and have to settle for alternate solutions.

one such approach is rely on protocol-specific mechanisms.  e.g. if its
HTTP, then something at HTTP.
oh wait - that won't deal with HTTP proxies either - but at least there is
some standardization on HTTP headers that proxies insert giving a hint of
the original client ip-address.

there are other approaches also.  a few years back when i spent a fair bit
of time in this area, my experience is that a hybrid system based on
specific protocol and generic solution (dns) worked best.  this simply
isn't an area where one solution fits all cases.

there are public companies whose business model depends on this being 'hard'
to do right.  them being capable of doing something 'better' than not all
all is the reason they are still in business.
i did a fair bit of research in this area as part of work i used to do a few
years back.  much of that research belongs to my employer - i thought it was
documented publicly in the form of a patent i am a co-inventor of - but
alas, i can't seem to find it on uspto.gov .. perhaps it hasn't been issued
yet .. i haven't tracked these things for years.

in either case, i guess its an example of where even commercial entities
whose business model depends on 'getting it right' most of the time do
indeed 'get it wrong' also.



cheers,

lincoln.



RE: DNS Based Load Balancers (redux)

2006-07-05 Thread ennova2005-nanog
 Stepping back for a moment...Many (most) popular services end up in multiple data centers first because they want to get diversity (of data centers, of ISPs, maybe of pricing). All mission critical sites will be designed such a subset of these data centers can take their entire load if need be.Once spread out this way - you may need to run some or all of them in an active/active configuration so you need to balance load between them in some fashion between them.If you are going to split the load - a natural desire is to split it such that it actually increases performance for users. You figure network proximity (of the end user to the serving destination) ought to be a criteria -but the load on your cluster may be more important for personalization intensive sites.You start with round robin DNS but it leaves you unsatisfied along the way. You play around with souped up DNS servers that are fed
 with monitoring tools that measure reachability as well as some measure of load. You also discover that the most popular browser will gladly ignore your TTL settings and insist on sending your traffic to the data center that is down. You are frustrated when you find out that users of ISP A are being served out of your Data Center at ISP B, even though you have a data center connected to ISP A. You think Anycast might be the answer but not everyone is set up to do Anycast. You find some clever people have been aggregating data that will offer to geolocate your callers IP addresses and maybe there is a way to use that information to find the nearest server. You realize the accuracy of this list is dubious, the exchange points for several countries may actually be on the coasts of the United States, and how would you integrate this into your DNS or HTTP redirector, while still doing 2 shift day job.You turn to alternatives, and find the shiny boxes and/or
 services called the GLBS. They perform 2 main services.First, they hand out answers, which may vary in time and space, to your clients as to where to find the service they are looking for.Second, they decide what this "right" answer is.You post to NANOG and you get admonished about their efficacy on both counts. This is initially wrapped in appeals to love of God and country and general harm that might befall mankind but no one says what or why.On reflection, objections to the first part of this are usually along the "strict constructionist" point of view. No real harm comes from returning changing answers but when the Man who wrote the book jumps in with both feet you take pause. He chides people for using stupid tricks. You wonder if they are stupid in the same way as the "For Dummies" series of books is not really for dummies.Objections to the determination of what the "right" answer is are more
 vociferous. Some immediately take the view that since the question was about DNS based load balancers, the inference was that the GLBS must be using DNS logistics to decide what the right answer is, even though DNS may simply be used to "right communicate the right answer ( the first part) , but not calculated ( the second part).The GLBS may indeed be using some measure of server load, or even BGP derived network maps, or some other knowledge of topology or proximity but that gets drowned in the "the proximity of the DNS resolver to the GLBS is not a proxy for the actual end user". The latter is actually strictly true, and it is difficult to argue given the specific examples of where it fails, but no one is able to say how many times in normal use this technique actually returns a bad answer.You even hear from a man with one leg in US and one in Europe using a split tunnel VPN who wonders why when he orders
 Pizza using his tunnel to the HQ back in Europe, he doesn't get greasy satisfaction back in the US. You wonder what happens when he calls 911 on his VOIP phone, without having manually configured his PSAP in that configuration, but you have other problems to worry about at the moment. You also hear about the "AOL Proxy" effect masking all users behind it. Well actually you don't hear that, but someone should have chimed in about that.You hear some mumbling about the use of AS path lengths or a geo-location database of end user IPs not being a true measure. Yet you wonder if the Internet is actually not getting more stable everyday and that the nominal topology and the AS Paths for the more heavily trafficked routes may actually not change that rapidly in normal course.You also hear from others who have been using variations of GLBS for several years, and have even created large businesses by serving their customers this way. Their web sites
 are full of gleaming testimonials from these customers. Some one says no one got fired for using the GLBS... You wonder if those customers just bought insurance.   You scratch your head some more. You want to order that pizza on line but you decide against it.You 

Re: IP Delegations for Forum Spammers and Invalid Whois info

2006-07-05 Thread Simon Waters

On Monday 03 Jul 2006 16:26, Phil Rosenthal wrote:
 
 We are very much anti-spam and I will look into Mark's issue - I'm
 looking  through the tickets for abuse@ and there is no email sent in
 from [EMAIL PROTECTED] ...

I suspect he tried [EMAIL PROTECTED] which seems to be in rfc-ignorant.

Looks like the server;

195.225.177.31

Has been spewing guest book spam (and wiki spam) out, as a quick google of 
195.225.177.31 nice site will show hundreds of links, although quite a lot 
of it just looks bizarre, and Dshield shows 80,000 odd reports port 80 probes 
in the last month from this address.

We've just cleaned up a lot of address book spam promoted sites, so I know it 
is relentless and tedious thing to squash.


Re: IP failover/migration question.

2006-07-05 Thread Michael . Dillon

 It's actually a rather frustrating
 situation for people who aren't big enough to justify a /19 and an
 AS#, but require geographically dispersed locations answering on the
 same IP(s).

If the number of IPs you require is small, then you can
probably solve the problem with IPv4 anycasting. Several
people have built out distributed anycast networks but 
the problem is that they think IPv4 anycast is a DNS thing.
Therefore they don't sell anycast hosting services to
people like you who need it.

Of course, if you made them more aware of market
demand, this could change.

--Michael Dillon



Re: DNS Based Load Balancers

2006-07-05 Thread John Payne



On Jul 5, 2006, at 5:18 AM, Lincoln Dale wrote:




but it's a perfect example of why GSLB based on DNS ain't perfect.

What would be a better solution then?


utopia would be for DNS to be enhanced in some manner such that the  
'end

user ip-address' became visible in the DNS request.
utopia would have NAT devices which actually updated that in-place  
so an
authoritive nameserver always authoritively _knew_ the public ip- 
address of

where the request was coming from.


That would kill all cacheability of DNS.

Split tunnel VPNs do somewhat break the DNS GSLB model, but I don't  
think that's
as bad as anti-DNS GSLB people claim it is.  If you were on a full- 
tunnel VPN, you

would expect to be sent to nocal, right?

This could also be fixed in split tunnel VPNs with a local DNS proxy  
that only used
the DNS cache on the other side of the VPN for the internal  
domains, and your ISP's
DNS cache for everything else.   That proxy could even be built into  
your VPN client.


With wide open recursive nameservers getting such bad press lately, I  
would expect

to see client - caching nameserver proximity getting a lot closer.


RE: DNS Based Load Balancers

2006-07-05 Thread Brandon Butterworth

 GSLB based on DNS have one significant shortcoming that moone here has yet
 mentioned: they are performing their magic on the location of the
 _nameserver_ that issued the query.
 
 this can be VERY different to that of the ACTUAL location of the client.

Systems that infer stuff make errors, at least DNS GSLB fails working

I've seen problems with DRM that assumed the IP requesting http would
be the same as that requesting rtsp, neither of which were the actual
client after some ISP caching.

 for example, Akamai always sends to off to a serverfarm in Northern
 California, because that's where my DNS query is originating from.
 
 that is almost the exact opposite side of the planet from where I'm coming
 from...

That's more a failure of your systems than Akamai, 
depending on something the other side of the planet
for something best done locally

 irony is that there is an akamai cluster about 10 feet away from where my
 [subsequent] http requests originate from...

yes, like a free ride when you've already paid


I don't see any point arguing over DNS GSLB. It exists, it can work,
and no surprise some products aren't well designed.

We've used a DNS GSLB system since 1997, it does the job we designed it
to, it has the edge cases we expected, we're happy with it.

Don't try using one without adult supervision

The hardware SLB products we've tried have caused more down time
than our DNS LB

brandon


Re: Fanless x86 Server Recommendations

2006-07-05 Thread Michael . Dillon

  We're looking to acquire a couple small servers that can act as 
routers for
  us at remote locations.
 
You may want to check out soekris. (www.soekris.com)

This type of server is far more common nowadays
than it was when Soekris launched their business.
A Google search will lead you to dozens of fanless
servers built around a VIA EPIA mini-itx board or
one of AMD's GEODE chips.

--Michael Dillon



Re: Fanless x86 Server Recommendations

2006-07-05 Thread Michael . Dillon

...but the fanless chips are 
 not always as fanless as you might like.  I've seen a number of them 
come 
 back well fried.

Fanless doesn't just mean no fans to break down.
It also means well-ventilated installation required.

Maybe you can find a datacenter with so many hot
bladeservers that they can't fill their racks. Then
you could ask them to give you 8U cheap at the bottom
of a rack and mount your servers vertically for
maximal airflow. ;-)

--Michael Dillon

P.S. on the other hand, if there is enough demand for
fanless server installations, maybe some datacenters
will begin to offer vertically vented space at the
bottom of their racks...



RE: DNS Based Load Balancers

2006-07-05 Thread David Schwartz


John Payne wrote:

 On Jul 5, 2006, at 5:18 AM, Lincoln Dale wrote:

  utopia would be for DNS to be enhanced in some manner such that the
  'end
  user ip-address' became visible in the DNS request.
  utopia would have NAT devices which actually updated that in-place
  so an
  authoritive nameserver always authoritively _knew_ the public ip-
  address of
  where the request was coming from.

 That would kill all cacheability of DNS.

Only if you envision an extension that adds an 'end user IP address' to 
the
query and doesn't add a 'scope of cacheability' to the reply. I admit it's
possible that an extension could be bungled that badly, but not likely.

DS




NANOG Spam?

2006-07-05 Thread Joe Johnson

Am I the only one to get this email?  Headers say merit.edu sent it.  I
have NANOG whitelisted, though, so it came to my mailbox.

HEADERS:
Microsoft Mail Internet Headers Version 2.0
Received: from mx1.exchange.riversidecg.com ([10.10.1.20]) by
be01.windows.riversidecg.com with Microsoft SMTPSVC(6.0.3790.1830);
 Wed, 5 Jul 2006 12:43:14 -0500
Received: from mail1.hosting.riversidecg.com ([172.31.0.1]) by
mx1.exchange.riversidecg.com with Microsoft SMTPSVC(6.0.3790.1830);
 Wed, 5 Jul 2006 12:43:14 -0500
Received: from localhost (localhost [127.0.0.1])
by mail1.hosting.riversidecg.com (Postfix) with ESMTP id
C656541A5BD
for [EMAIL PROTECTED]; Wed,  5 Jul 2006 12:41:19 -0500
(CDT)
Received: from mail1.hosting.riversidecg.com ([217.160.254.38])
by localhost (viruscheck1.hosting.riversidecg.com
[217.160.254.38]) (amavisd-new, port 10024)
with ESMTP id 32017-09 for [EMAIL PROTECTED];
Wed, 5 Jul 2006 12:41:15 -0500 (CDT)
Received: from trapdoor.merit.edu (trapdoor.merit.edu [198.108.1.26])
by mail1.hosting.riversidecg.com (Postfix) with ESMTP id
6A32C41F358
for [EMAIL PROTECTED]; Wed,  5 Jul 2006 12:41:15 -0500
(CDT)
Received: by trapdoor.merit.edu (Postfix)
id 7D1CA91265; Wed,  5 Jul 2006 13:39:22 -0400 (EDT)
Delivered-To: [EMAIL PROTECTED]
Received: by trapdoor.merit.edu (Postfix, from userid 56)
id DF52991264; Wed,  5 Jul 2006 13:39:20 -0400 (EDT)
Delivered-To: [EMAIL PROTECTED]
Received: from trapdoor.merit.edu (unknown [84.232.124.32])
by trapdoor.merit.edu (Postfix) with SMTP id AD0CF91265
for [EMAIL PROTECTED]; Wed,  5 Jul 2006 13:39:15 -0400
(EDT)
From: [EMAIL PROTECTED] [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Content-type: text/html;
 Charset=Windows-1251
Subject: ***SPAM*** Wanna hold a brick on your dick? Try our Soft Cialis
Tabs. (Warning: =?iso-8859-1?Q?don=92t?= try it). 
Message-Id: [EMAIL PROTECTED]
Date: Wed,  5 Jul 2006 13:39:15 -0400 (EDT)
Sender: [EMAIL PROTECTED]
Precedence: bulk
Errors-To: [EMAIL PROTECTED]
X-Loop: nanog
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at
viruscheck1.hosting.riversidecg.com
X-Amavis-Alert: BAD HEADER Non-encoded 8-bit data (char 92 hex) in
message header 'Subject'
Subject: ...r Soft Cialis Tabs. (Warning: don\222t try it). \n ^
X-Spam-Status: Yes, hits=20.6 tagged_above=6.0 required=8.0
tests=BAYES_50,
DRUGS_ERECTILE, FB_CIALIS_LEO3, FB_Y0U, FR_3TAG_3TAG,
HTML_30_40,
HTML_MESSAGE, HTML_MIME_NO_HTML_TAG, HTML_NONELEMENT_60_70,
MIME_8BIT_HEADER, MIME_HEADER_CTYPE_ONLY, MIME_HTML_ONLY,
RAZOR2_CF_RANGE_51_100, RAZOR2_CHECK, SARE_HTML_MANY_BR05,
SARE_HTML_MANY_BR10, SUBJECT_DRUG_GAP_C, URIBL_AB_SURBL,
URIBL_OB_SURBL, URIBL_SBL, URIBL_SC_SURBL, URI_END_IS_SHORT
X-Spam-Level: 
X-Spam-Flag: YES
Return-Path: [EMAIL PROTECTED]
X-OriginalArrivalTime: 05 Jul 2006 17:43:14.0506 (UTC)
FILETIME=[7DD21AA0:01C6A05A]



BODY:

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Wednesday, July 05, 2006 12:39 PM
To: [EMAIL PROTECTED]
Subject: ***SPAM*** Wanna hold a brick on your dick? Try our Soft Cialis
Tabs. (Warning: don't try it). 


With our Soft Cial1s Tabs y0u can have $ex:

Anytime. 
Anywhere. 
W1th anyone you want. 
@s l0ng as you want. 
As often as you want.
http://oarwind.info/ct/? http://oarwind.info/ct/ 
Be a man of her dreams with Cialis Soft Tabs!


=640504C41456EBDBB49B2B4A1ABAC6AAFAF95978A509E9A8=















he felt worse, as he now had a sharp pain in his toe to deal with in
addition 


Re: DNS Based Load Balancers

2006-07-05 Thread Paul Vixie

 As someone who has also deployed GSLB's with hardware applicances I would
 also like to know real world problems and issues people are running into
 today on modern GSLB implementations and not theoretical ones, as far
 as I can tell our GSLB deployment was very straight forward and works
 flawlessly.

since works flawlessly could just mean that you don't have any reported
problems with the technology -- no complaints from your users, no bugs logged
with your vendor, etc, i have two bracketing questions.

first, have you measured the improvement you got -- in terms of
min/max/avg/stddev of TTFB/TTLB (time to first byte / last byte)
with the appliances turned on vs. turned off?

second, have you measured the dns damage your gslb might cause or
contribute to, due to things not responding to unhandled QTYPES
( comes to mind) or use of abnormally low DNS TTL?

i'm not as much interested in whether a technology causes no problems for its
operator as whether its cost:benefit is worthwhile to the internet community.
-- 
Paul Vixie


Re: DNS Based Load Balancers

2006-07-05 Thread Paul Vixie

 What would be a better solution then?

multiple A RR's for your web service, each leading to an independent web
server (which might be leased capacity rather than your own hardware),
each having excellent (high bandwidth, low latency, etc) connectivity to
a significant part of the internet.  the law of averages is a good friend
to those who can adequately provision, so the likely outcome is that you
won't need anything fancy.  but if you need something fancy, use session
level redirects to tell a web browser or sip client that there's a better
and closer place for them to get their service.  pundits please note that
the fancy thing i'm recommending sit perfectly on top of the non-fancy
thing i'm recommending.
-- 
Paul Vixie


re: NANOG Spam?

2006-07-05 Thread Etaoin Shrdlu


Joe Johnson wrote:

Am I the only one to get this email?  Headers say merit.edu sent it.  I
have NANOG whitelisted, though, so it came to my mailbox.


You do realize that by including the whole email, that anyone who had it
blocked, will not have seen your message either. I have multiple spam
filtering, and that message was trapped at my first line of defense.
Only because I have the habit of grepping From headers, did I see your
message...

What was funny is that you got a higher score with spamassassin than the
original spam did;-)

--
No matter how much you want to try and spin it,
MySpace is the Paris Hilton of the internet.

(http://www.digg.com/users/ArcaneDevice)


Re: NANOG Spam?

2006-07-05 Thread Gregory Hicks


 Subject: NANOG Spam?
 Date: Wed, 5 Jul 2006 12:56:19 -0500
 From: Joe Johnson [EMAIL PROTECTED]
 To: nanog@merit.edu
 
 
 Am I the only one to get this email?  Headers say merit.edu sent it.  
I
 have NANOG whitelisted, though, so it came to my mailbox.
 
[...snip spam...]

No, I got it as well but Postini caught it for me.  So I hadn't seen
it...

Just a joe-job though.  The headers are forged.  See the IP address
in thi FIRST Received-by: header.  Came from Spain.

[...snip later headers...]
Received: from trapdoor.merit.edu (unknown [84.232.124.32])
by trapdoor.merit.edu (Postfix) with SMTP id AD0CF91265
for [EMAIL PROTECTED]; Wed,  5 Jul 2006 13:39:15 -0400 
(EDT)
From: [EMAIL PROTECTED] [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Content-type: text/html;
 Charset=Windows-1251
---

% Rights restricted by copyright.
% See http://www.ripe.net/db/copyright.html

% Information related to '84.232.124.0 - 84.232.125.255'

inetnum:84.232.124.0 - 84.232.125.255
netname:TELELEPE-NET
descr:  Television Por Cable
descr:  Hermanos Ponce Garcia S.L.
descr:  Local TV and ISP Provider
country:es
admin-c:GPP18-RIPE
tech-c: GPP18-RIPE
status: ASSIGNED PA
mnt-by: SERVIHOSTING-MNT
source: RIPE
changed:[EMAIL PROTECTED] 20060126

person: Gregorio Ponce Pozuelo
address:C/NiƱa, 31
address:21440 Lepe (Huelva) SPAIN
phone:  +34 959645086
fax-no: +34 959158409
e-mail: [EMAIL PROTECTED]
nic-hdl:GPP18-RIPE
notify: [EMAIL PROTECTED]
mnt-by: SERVIHOSTING-MNT
changed:[EMAIL PROTECTED] 20060126
source: RIPE

% Information related to '84.232.0.0/17AS29119'

route:  84.232.0.0/17
descr:  ServiHosting Networks S.L.
descr:  First Allocation
remarks:**
remarks:|For ABUSE/SPAM/SCANS issues |
remarks:|send mail to [EMAIL PROTECTED]  |
remarks:|or Fax at number +34.966982510  |
remarks:**
origin: AS29119
mnt-by: SERVIHOSTING-MNT
notify: [EMAIL PROTECTED]
changed:[EMAIL PROTECTED] 20060113
source: RIPE

Regards,
Gregory Hicks

-
Gregory Hicks   | Principal Systems Engineer
Cadence Design Systems  | Direct:   408.576.3609
555 River Oaks Pkwy M/S 9B1
San Jose, CA 95134

I am perfectly capable of learning from my mistakes.  I will surely
learn a great deal today.

A democracy is a sheep and two wolves deciding on what to have for
lunch.  Freedom is a well armed sheep contesting the results of the
decision. - Benjamin Franklin

The best we can hope for concerning the people at large is that they
be properly armed. --Alexander Hamilton



Re: NANOG Spam?

2006-07-05 Thread Allen Parker


On 7/5/06, Gregory Hicks [EMAIL PROTECTED] wrote:



 Subject: NANOG Spam?
 Date: Wed, 5 Jul 2006 12:56:19 -0500
 From: Joe Johnson [EMAIL PROTECTED]
 To: nanog@merit.edu

snip

Just my .02, emails to [EMAIL PROTECTED] (HA! like i'll get a
response!) and [EMAIL PROTECTED] (not expecting a response from
this one either) have been sent. Anybody else feel like telling these
folks that they've got spammers on their networks?


Allen Parker


Re: NANOG Spam?

2006-07-05 Thread William Allen Simpson


Gregory Hicks wrote:

Just a joe-job though.  The headers are forged.  See the IP address
in thi FIRST Received-by: header.  Came from Spain.

[...snip later headers...]
Received: from trapdoor.merit.edu (unknown [84.232.124.32])
by trapdoor.merit.edu (Postfix) with SMTP id AD0CF91265
	for [EMAIL PROTECTED]; Wed,  5 Jul 2006 13:39:15 -0400 
(EDT)

From: [EMAIL PROTECTED] [EMAIL PROTECTED]
To: [EMAIL PROTECTED]


Yes, we all got it, and Google spam filters let it through, as it
matches a valid mailing list.

No, the received headers are not forged.  The From and To are forged.

The spammers have figured out how to bypass the NANOG members-only
posting, in this case by pretending to be John Fraizer and sending
directly to trapdoor.

They're using old lists. He hasn't sent anything to NANOG from that
address since 15 Feb 2005 14:30:47 -0500.

Anyway, it's probably a good thing to nip this in the bud.  It
should hurt (a lot) to send spam to network operators themselves.

AS  | IP   | AS Name
29119   | 84.232.124.32| SERVIHOSTING-AS ServiHosting N

PEER_AS | IP   | AS Name
6739| 84.232.124.32| ONO-AS Cableuropa - ONO




Re: NANOG Spam?

2006-07-05 Thread Jim Popovitch


William Allen Simpson wrote:

The spammers have figured out how to bypass the NANOG members-only
posting, in this case by pretending to be John Fraizer and sending
directly to trapdoor.


On our public list servers we now require admin approval of all new 
subscriptions as well as email verification.  It takes time, but it is 
worth it.  Additionally, the admins occassionally reply to new 
subscribers with questionable addresses and ask them for a bit more 
info (who/what/why/etc).  Finally all new subscribers are automatically 
moderated until their first post proves them to in fact be legit and on 
topic.  Finally, we crawled the archives of the big lists and have come 
up with a list of subscribers who haven't posted in over 9 months, we 
plan to set the mod bit on them too very soon.   These are necessary 
steps simply because we see at least 30 requests each week for what 
amounts to invalid subscriptions, if those subscriptions went through 
unfettered then users would be upset.  Even if one bogus subscription 
slips through, the auto-mod provides a second chance to stop them. 
Perhaps these are some ideas for the NANOG mailinglist admins to implement.


-Jim P.




Re: NANOG Spam?

2006-07-05 Thread William Allen Simpson


Allen Parker wrote:

Just my .02, emails to [EMAIL PROTECTED] (HA! like i'll get a
response!) and [EMAIL PROTECTED] (not expecting a response from
this one either) have been sent. Anybody else feel like telling these
folks that they've got spammers on their networks?


I sent to [EMAIL PROTECTED] about the spam source.

And also to [EMAIL PROTECTED]  Also tried [EMAIL PROTECTED]

The spam beneficiary was, of course, a US entity pretending to be from
Germany, with a throwaway obscured Yahoo address:

Domain Name:OARWIND.INFO
...
Tech Name:Audrey Pokela
Tech Organization:Audrey Pokela
Tech Street1:2940 115 Ave NW
Tech Street2:
Tech Street3:
Tech City:COON RAPIDS
Tech State/Province:MN
Tech Postal Code:55433
Tech Country:US
Tech Phone:+1.7634272392
Tech Phone Ext.:
Tech FAX:
Tech FAX Ext.:
Tech Email:[EMAIL PROTECTED]
Name Server:NS1.RENTSHELL.INFO
Name Server:NS2.FORTWALK.INFO
Name Server:NS1.BUSITEEN.INFO
Name Server:NS2.SPOLF.INFO


oarwind.info.
AS  | IP   | Registry | AS Name
6724| 81.169.143.178   | ripencc  | STRATO Strato AG

PEER_AS | IP   | Registry | AS Name
1273| 81.169.143.178   | ripencc  | CW Cable _ Wireless
5430| 81.169.143.178   | ripencc  | FREENETDE freenet Cityline Gmb

inetnum:  81.169.128.0 - 81.169.143.255
netname:  STRATO-RZG-DED
descr:Strato Rechenzentrum, Berlin
country:  DE
admin-c:  CM265-RIPE
tech-c:   XX1-RIPE
tech-c:   WB14-RIPE
remarks:  **
remarks:  * please report spam/abuse/attaks mailto:[EMAIL PROTECTED] *
remarks:  * reports to other addresses will not be processed   *
remarks:  * please do not report simple portscans  *
remarks:  **
status:   ASSIGNED PA
mnt-by:   STRATO-RZG-MNT
mnt-lower:STRATO-RZG-MNT
mnt-routes:   STRATO-RZG-MNT