Re: [swinog] Cloudflare DMCA Takedown requests - but content not present under mentioned IP

2021-07-06 Diskussionsfäden Markus Wild
Hello Benoit,

> I am a bit puzzled by repeated Cloudflare Takedown Requests regarding
> the domain: lord-film.cash we are getting.
> 
> lord-film.cash has address 172.67.181.230
> lord-film.cash has address 104.21.32.5
> lord-film.cash has IPv6 address 2606:4700:3035::6815:2005
> lord-film.cash has IPv6 address 2606:4700:3032::ac43:b5e6
> 
> According to Cloudflare, the content is hosted at an IP address under
> our control, on a Webserver on Port 80.

I find this a bit odd, that they'd send you take-down requests for their own IP 
addresses

when I search the domain in google, they show some site with cyrillic 
description (russian?), and you can even look at
the cached page in google, and it does seem to host movies (just ran it through 
google translate). My guess is the
entry page is probably geo fenced. I then clicked some of the russian links, 
was again redirected through cloudflare
with their infamouse captchas, but was finally shown this link:

https://hd-1.lordfilms.help/2019/01/06/vpered-v-proshloe-2007.html

which, again, is hosted at cloudflare...

It definitely looks illegal for consumers in DMCA countries...

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] sendinblue / newsletter sender whitelisting?

2021-07-01 Diskussionsfäden Markus Wild
Hello Michael

> In the last weeks we had requests from customers, whose "newsletter" via 
> sendinblue could not be delivered to us. In
> the logs I see at the given time, that the IP of sendinblue was on the 
> blacklist of spamcop.net. That is, the mails
> were rejected by us. 
> 
> The customer now says the mails go through everywhere else (I'm looking at 
> you bluewin.ch), just not with you. 

we're actively blocking many of their servers due to sending our customers 
spam, so
that will invalidate that "everywhere else" statement a bit;)

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Handling of UCE / RBL while minor misconfigurations

2020-10-27 Diskussionsfäden Markus Wild


> well, technically, they (UCEProtect) are correct.

Sure, if I shoehorn my own rules, I can almost guarantee that _I_ will be 
compliant.
That doesn't make them any more relevant though.

> If an IP sends a mail with the From: header indicating a domain for 
> which an SPF record exists, and the sending IP is not supposed to send 
> it, then it is a misconfiguration and that IP should not be trying to 
> send such a mail at all.

But SPF is supposed to be applied to the SMTP envelope address, NOT whatever 
happens to be put into any header lines... For headers you got your other 
voodoo,
like DKIM. And I'm also not so sure that this is a misconfiguration, since that 
would assume I'd give SPF the same kind of authority as I give basic SMTP 
relaying, 
which I don't. I'll repeat myself: SPF is broken by design.

But, I'll actually consider putting in an option into our mail configuration 
pannels,
that lets customers who are forwarding mail to 3rd party servers, reject 
inbound mails
if their forwarding would violate the sender policy. After all, it's our 
customers who
pay us to handle their mail, not external mail senders, and thus customers 
should have
the last word in this decision. Given though how many mail delivery errors 
never make
it back to the sender, I wonder if this added complexity would really be 
beneficial.
My gut feeling is: nope.

The reply of UCEProtect fits my impression I got of them, and it confirms to me 
that
I can't take them seriously. I'll let them throw tantrums in their playpen and 
move on.

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Handling of UCE / RBL while minor misconfigurations

2020-10-08 Diskussionsfäden Markus Wild
Hey Jeroen,

> SPF is only a part of a solution to the battle of spam.

SPF isn't suited to combat SPAM at all (including the whole other DKIM etc 
enchilada), since it's quite trivial for
spammers to define these records correctly in throwaway domains. Thus, no 
reasonable spam filter can honour (in a
positive way) the presence of an SPF record, they can only punish the 
connection if there is an SPF record and the
connection is in violation of that record. The really only benefit you could 
get from SPF is some kind of antispoofing
protection, but at least in my experience, that is hardly ever a real problem 
to begin with.

> It helps a lot to combat broken setups.
> 
> If a setup is broken, they are not worthy of receiving mail in the first 
> place.
> 
> Thus, if you hate on SPF, I can only conclude you have shot yourself in the 
> foot a lot with it.

No, I hate SPF because it breaks basic SMTP relaying, or in more enduser speak: 
redirected mails. Mail is _NOT_ always
delivered directly from origin to target, it is quite frequent, that mails get 
redirected to 3rd party systems.
Some SPF advocates just accept their mails failing because they consider mail 
redirects to be evil. Fine. To really fix
those redirect issues, _all_ possibly relaying servers would have to adopt some 
kind of sender rewriting scheme, which
as far as I recall, can blow up sender email addresses to sizes that will 
exceed RFC standards in very few iterations.
Also, in these cases the relaying server will originate 3rd party mails with 
its own domain name, possibly turning
it into a spam funnel. So, for me, SPF is broken by design, and no amount of 
additional tinkering around its pitfalls
will fix that.

Cheers,
Markus





___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Handling of UCE / RBL while minor misconfigurations

2020-10-08 Diskussionsfäden Markus Wild
Hello Urs,
 
My take on your problem is the following:
- SPF is bad and breaks mail delivery, don't use it. But, if someone defines 
SPF records, and they thus declare they
  want to shoot themselves into their feet, by all means, I encourage to block 
mails failing SPF, because that's what
  domain owners who define SPF records ask for.
- everyone can setup blocking lists defining the oddest criteria for when an 
entry gets added. Someone in charge of a
  mailserver can decide based on his criteria, and his alone, what mails he 
wants to receive and what mail to reject.
  He can use whatever resources he wants, including bogus lists such as 
uceprotect. But, it would be prudent to inform
  yourself about what exactly you enable before you do so...
- now, if someone deploys antispam gateways such as those from Sophos, and 
decides to just click "enable all block
  lists" or however that menu looks like, and with this enables lists such as 
uceprotect, then that person just cut
  their company off from a lot of valid mail. If he wanted to do that, it's his 
decision, but usually it helps to teach
  those admins about the errors of their ways, instead of blaming the list 
provider.
- I personally consider uceprotect to be a rogue list with utopian views on how 
mail service works. Their unlist policy
  could be considered extortion, but the really responsible party is whoever 
enables such a list on their servers.

just my personal views:)

Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Sporadic DNS resolver error for *.mail.protection.outlook.com

2018-05-22 Diskussionsfäden Markus Wild

> we see sporadic DNS resolver errors for A records of 
> *.mail.protection.outlook.com
> 
> Only a few per day vs many successful lookups.

I haven't noticed this, but we found out last week that Microsoft apparently 
has enabled a new cluster of servers for
europe in networks 40.92.7[345].*. All of these currently completely lack PTR 
data, and the corresponding SOA suggests
a last modification date of February 5, 2018:

92.40.in-addr.arpa. 3600IN  SOA ns1.msft.net. 
msnhst.microsoft.com. 2018020502 7200 900 2419200 3600

they pop up in logs such as this:

 [40.92.75.99] claimed to be EUR04-VI1-obe.outbound.protection.outlook.com

and rejected connections seem to carry only freemail services (hotmail, 
windowslivemail).

We informed SOA and whois contacts last Wednesday, but haven't heard back from 
them.

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Mail to CNAME a thing?

2018-02-22 Diskussionsfäden Markus Wild
Cheers Jeroen,

> If you are anti-spam, don't bother checking this (dom.com A); anybody
> who wants to receive mail will have an MX, if not, let them join the
> 2000s...

There are actually quite a few (definitely more than white noise) senders that 
don't have MX, and only use A records.
Many of these are from what I call "isp-in-a-box" resellers, who a) don't know 
how to properly setup their servers, and
b) since web-server-address and mail-server-address are the same, things "just 
work" if they only point their domain
name to the IP address of their virtual server. While I don't think that's a 
good setup, I'm not at the liberty of
denying our customers to receive mails from such senders :)

> Also, instead of bothering with the MX Lookup, verify and enforce SPF,
> DKIM and DMARC instead, they are meant for checking against the envelope

Oh, if a sender deliberately wants to break his mail delivery and defines such 
records, you can be sure we'll test for
them, and classify the mail as SPAM if they fail. We don't encourage their use, 
but you bet we'll enforce them if
they're set.

> From, MXs are not. Non-existence of a MX on a domain does not mean it
> does not get used for sending mail; thus you might have a small false
> positive rate there... (which you might chose to accept, you are the
> receiving end, hope you have an informative rejecting message ;) )
> 
> Spammers will make sure that MX, SPF, DKIM and DMARC are all configured
> btw; they only really 'resolve' spoofing issues.

Yes, I consider SPF and friends evil, as I pointed out above, but will 
definitely enforce them when provided. My stance
on the MAIL FROM address is: if we accept a mail for delivery/relay, we also 
accept the responsibility to deliver back
DSN mails to the sender, if there is a problem with the finaly delivery of the 
mail later on. For that, we need a
valid, usable sender address. If there isn't one, we won't accept the mail. It 
is also a very effective tool to weed
out many spammers without resorting to content analysis (and is thus much more 
efficient, as well). MX to localhost?
bye bye :)

> I assume you also allow '<>' for DSNs?

I do, but I severely restrict what we allow in these mails, their size, only a 
single recipient, etc.

> If you do the above, you might want to check for "MX .", this indicates
> a domain that will never send mail as per RFC7505:
> 
> https://tools.ietf.org/html/rfc7505

I don't have to check for this explicitly, because it will fail the A lookup 
check, so it will be considered an invalid
domain for an email address. But thanks for the pointer, didn't know about this 
rfc.

> But again: MX is for _receiving_, not _sending_ (From) thus checking it
> is a bit wrong, but at your prerogative.

I explained my reasoning above, why we do verify the sender like this.

> Last note: do _not_ use 'host' for debugging DNS related issues, always
> use the very useful 'dig' tool, or if you want use 'drill' instead.
> ('host' hides various error situations and does not properly show what
> you are actually querying...)

I actually do use dig normally, I used "host" here because the output is much 
more terse and thus better suited to
explain a problem and keep the description smallish (my mail was too long 
already for some people;-))

Ciao,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Mail to CNAME a thing?

2018-02-20 Diskussionsfäden Markus Wild
Short update on this problem, which should be fixed by now:
- I was able to reach the responsible team, and they answered very quickly. I 
was positively surprised!
- They confirmed there's a problem with the zone content on their Dyn 
nameservers
- They then added additional NS records on level msa.msidentity.com to point 
only to Akamai servers (overriding the
  50:50 split for msidentity.com)
- The result now is that mail.msa.msidentity.com gets resolved only bei Akamai 
servers, and should thus resolve
  reliably.

I don't know the reason why they couldn't just fix the zone copy that gets 
distributed to the Dyn servers, but the
workaround fixed the problem at hand, so problem solved :)

Congrats to the Microsoft AAD Network SRE team, I didn't hope to get any 
answer, but they took care of the problem
right away!

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Mail to CNAME a thing?

2018-02-19 Diskussionsfäden Markus Wild
Cheers Stephan,

> I might be wrong but according to RFC 2821 it is ok to use a CNAME if 
> the target is resolvable to A or MX.
> 
> 3.6 Domains
> 
> Only resolvable, fully-qualified, domain names (FQDNs) are permitted
> when domain names are used in SMTP.  In other words, names that can
> be resolved to MX RRs or A RRs (as discussed in section 5) are
> permitted, as are CNAME RRs whose targets can be resolved, in turn,
> to MX or A RRs.  Local nicknames or unqualified names MUST NOT be
> used.

True, so guess I'll modify my validation rules according to this. Thanks!

> However, the target domain in this case is not working correctly.

I've found that inconsistency as well between their 2 main DNS providers. 
Akamai, using serials that seem to be
unix timestamps, returns MX records. dynect.net using sequentially incrementing 
serials (much lower, Windows DNS? :))
doesn't return any MX. So, it's essentially pretty random whether the address 
resolves, or not...

I've tried to communicate this to aadnet...@microsoft.com, as per:

msidentity.com has SOA record ns1.p09.dynect.net. aadnetsre.microsoft.com. 
23844 3600 600 604800 1800

but some part of me will be very surprised if I'll get any answer back from 
that address...

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Mail to CNAME a thing?

2018-02-19 Diskussionsfäden Markus Wild
Hello Ralph

> [TL;DR]  ;-)

sorry about that, but it's not about an MX to a CNAME, it's about the domain 
part being resolved
directly via a CNAME (kind of like having a domain-level CNAME to another 
domain, except _THAT_ isn't allowed
due to shadowing NS and SOA records). With something like 
"accountprotection.microsoft.com" they're probably
not breaking that rule though.

When you have time, I'd welcome an answer to my question ;)

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


[swinog] Mail to CNAME a thing?

2018-02-19 Diskussionsfäden Markus Wild
Hi there,

I've just come across a weird mail reception problem of some mails from 
Microsoft. Our servers insist that
a specified MAIL FROM address can be resolved correctly, and this usually boils 
down to the following checks 
on the domain-part of the email-address specified:
- is there an MX? Does the target resolve using an A record (not a CNAME), and 
does it resolve to a publically
  reachable address (not RFC1918 or localhost etc)
- if there is no MX, is there an A record that fulfils the same criteria as the 
MX target above?
- if none of these are true, the address is considered to be invalid and mail 
is rejected

Since about Feb 15, I've now come across mails from 
account-security-nore...@accountprotection.microsoft.com that
get rejected. When I manually perform the above steps, I can see why, and I 
also see a first: the domain part is
actually a CNAME, something I've not encountered mentioned in standards as 
being a legal way to perform address
resolution when delivering email. But, I also don't recall reading about rules 
that explicitly deny this, contrary
to the very explicit rules that for example deny having MX point to CNAME. The 
domain setup here is borked in multiple
ways however:

$ host -t mx accountprotection.microsoft.com
Host accountprotection.microsoft.com not found: 3(NXDOMAIN)

$ host -t a accountprotection.microsoft.com
Host accountprotection.microsoft.com not found: 3(NXDOMAIN)

BUT:

$ host -t cname accountprotection.microsoft.com
accountprotection.microsoft.com is an alias for mail.msa.msidentity.com.

and even if we should allow use of a CNAME here, we'd have to apply the same 
rules as stated initially on the
CNAME target, and these fail as well:

$ host -t mx mail.msa.msidentity.com.
Host mail.msa.msidentity.com not found: 3(NXDOMAIN)

$ host -t a mail.msa.msidentity.com.
Host mail.msa.msidentity.com not found: 3(NXDOMAIN)

So, what's your take on this? Does someone see a legal way to resolv this 
sender, that I've missed? Am I right in
considering these addresses to be unresolvable and thus reject these mails? Who 
would I have to report this to at
Microsoft to have any chance of a human person looking at the issue?

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


[swinog] Looking for person responsible for *@mms.sunrise.ch

2017-02-27 Diskussionsfäden Markus Wild
Sorry to spam the list for this, but I was not able to find anything close to a 
technical support email contact on
their web page...

To avoid many round trip mails, here's the problem:

we get incoming mails with senders like <+4176...@mms.sunrise.ch>. 

But:

mms.sunrise.ch. 3600IN  MX  10 mm3.sunrise.ch.

Host mm3.sunrise.ch not found: 3(NXDOMAIN)


So, those sender addresses are invalid, and get rejected on our mail servers. 
Might want to fix your DNS..

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Bad Connectivity at UPC Home Internet

2016-08-17 Diskussionsfäden Markus Wild
My guess is, UPC just has the occasional overbooked peering link problem. A 
while ago I was
frequently watching youtube videos, and found the quality to drop considerably 
in the early evening hours,
when probably many other customers also started to watch youtube. Enabling a 
VPN to the UK, sometimes
even to the US, brought back the quality. So, in my interpretation, my home 
connection was NOT the culprit,
but the backbone interconnection of UPC with the peers I was watching content 
from.

I haven't had such frequent issues recently, but then I also mostly switched to 
watching twitch instead of
youtube, and that will go over different peering links.

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Rack mounting Switch/Routers in Cold and Hot Isle DC

2016-08-04 Diskussionsfäden Markus Wild
Hello Patrick,

> In theory, one should mount the switches/routers in front (toward cold isle)
> of the rack to have an optimal airflow, but then cabling get a little bit
> messy.
> 
> If this type of equipment is mounted in the back (toward hot isle), the
> cabling can be done much cleaner, but the airflow isn't optimal and in worst
> case, switches and routes take in hot air from other devices.

the most elegant solution is to buy devices in a reverse airflow configuration. 
That
is however not always possible. The worst type are switches with sideways 
airflow, since
those will always suck up warm air. Those with regular airflow you can at least 
mount
inverted into the racks (and get a cable mess, as you predicted). 

we just got a bunch of cheap 10GE switches for a test platform, and these only 
came with a regular
airflow configuration. The workaround here was to order them with fiber SFP+ 
instead of copper
DAC cables, since fiber cables are much easier (because they're thinner) to 
route through half the rack.

whatever you do: set up polling of the inlet temperature with SNMP if your 
devices support
such a MIB. ColoZH can get _very_ hot and it's vital you know whether you're 
slowly cooking your
devices, or whether they're within specs.

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


[swinog] QSFP to SFP+ breakout cables ?

2015-06-04 Diskussionsfäden Markus Wild
Hi there,

I'm looking for reasonably priced QSFP (40GE) to SFP+ (10GE) twinax breakout 
cables (3m long or so). I can
order via ebay for ~$150 but I was wondering whether there's a local 
distributor who has
a stock for them and doesn't sell them at 500CHF or more... Any recommendation?

Also, what kind of adapter would I need to break out a QSFP to 4 SFP+ sockets 
(where I could then attach
fiber SFP+)? Haven't seem something like that, but perhaps I'm searching wrong? 

Thanks for any hints !

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


[swinog] How to automate abuse complaints for ip based violations

2013-08-23 Diskussionsfäden Markus Wild
Hi there,

when looking through traffic analysis, I can more or less easily
identify IP addresses that exhibit bad behavior (like
massive port/address scanning, attempting to log into joomla/wp
administration URLs, POP3/SMTP account scanning, etc) which need to be
blocked. Now, since most of these IPs are not the actual culprits, but
merely infected machines, it would be helpful for the internet health
as a whole to report such incidents to their respective ISPs. Here's
where the problem starts:) My manual approach would be to lookup whois
data for the respective IP (which by itself can be a multi step process,
since you first need to find the right registry), and look for an
abuse-contact there. But, whois isn't exactly engineered for automated
mass lookups (+), and if I did this I'm sure I'd probably be violating
terms of use of at least some of the registry whois servers, and be
locked out. So, what alternatives are there? I saw that abuse.net keeps
a nice DNS based lookup service for domain names, but they
unfortunately don't do this for IP addresses. How are others doing
this? I know I occasionally received output of fail2ban scripts when
working for a larger ISP. Are these all in-house local developments?

Cheers,
Markus


(+) joomla/wp scans alone yielded  3000 ip addresses in one day for
our little network...


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Replacement Fan for C2950-T-24?

2013-06-26 Diskussionsfäden Markus Wild
 Does anyone know a good source for replacement fans for the Cisco
 2950-T-24?
 
 A silent version would be preferred.  The fan is 40x20mm and has a
 3-pin connector.  Yes, I've already checked Digitec but they don't
 seem to have anything that matches.

tried distrelec? they have plenty of papst fans which usually are very
quiet. perhaps this one will work, even though it's flatter than the
one you're looking for?

https://www.distrelec.ch/axiall%C3%BCfter-dc-40-x-40-x-10-mm-12-vdc/papst/412-f-2h/698050/it--zubeh%C3%B6r

cheers,
markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Transparent 1Gig Ethernet over IP/Ethernet?

2013-06-16 Diskussionsfäden Markus Wild

 I need to transparently (especially LACP 
 frames) transport a gigabit ethernet link with at least 1500 MTU over 
 either IP or Ethernet. Jumbo frames are enabled on 
 the L2 transport backbone. While I need full (some encap overhead
 will be acceptable) GigE wire speed, encryption is unnecessary.

Since you don't need encryption, aren't these more or less the same
requirements as to transport dot1q tags within an existing vlan, that
is, q-in-q? The foundry/brocade approach would be to override the frame
tag on the entry and exit ports and declare those ports as access-ports
(untagged to transport-vlan XYZ), thus transporting anything that comes
in there via vlan XYZ to the destination. Or is LACP more low-level and
can't be tricked to be relayed by playing with frame types?

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] IP network not reachable from switzerland - 69.162.65.122, but from outside, eg belarus/brasil

2011-04-08 Diskussionsfäden Markus Wild
 so host 69.162.65.122 is only answering to ICMP echo requests,
 and listens to tcp25 and tcp80
 
 could you be so kind and check, if you can connect to this host, and
 tell me, via which ISP / peering ?

Does _not_ work when exiting via the preferred path (I see two primary
routes, one via 6461_46475 and one via 12179_46475, whereas the latter
has many 12179 prepended and is not normally used).

I _could_ get there when exiting via our cogent link (and thus using
the 12179 path) _and_ using the cogent link IP address. When I use the
same path, but one of our own IP addresses, I can't get there.

So, perhaps the problem is not with the reachability of your network
from Switzerland, but the reachability of Swiss networks from that IP
address?

Cheers,
Markus



___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] IronPort E-Mail Reputation

2010-06-24 Diskussionsfäden Markus Wild
 4) Loopback*
 
 MSN/Hotmail
 http://postmaster.msn.com/Services.aspx#SenderSolutions

Has anyone managed to register their AS or simply some networks with
SNDS ? I keep getting the very helpful We're sorry! An error has
occurred error on the registration page, and requesting (repeated)
help from the contact email msn-s...@microsoft.com returns
zip/null/nada... It's like sending mail into a black hole...

Cheers,
Markus


___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Netclean - news

2008-12-10 Diskussionsfäden Markus Wild
Excuse my ignorance, since I didn't make it to last SWINOG... the
description on their web site implies the system is using BGP to
distribute the black list. Assuming this just distributes IP addresses
of web servers hosting questionable content, by blocking those, will
that not block content of ALL hostings hosted on that IP address? What
about hosters who also host other services on that IP address, like
perhaps DNS and mail services? I recall a time where an email RBL was
implemented using BGP blackholing, and we can into exactly those
problems...

Cheers,
Markus
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] cybernet/swisscom - anti-spam measures and blacklists

2007-11-14 Diskussionsfäden Markus Wild
 Is anyone else getting emails rejected by cybernet/Swisscom with this
 message:
 
 2007-11-14T09:54:49+0100 louiswu72 postfix1/error[8302]: 1FD0D2B0FA:
 to=nn, relay=none, delay=2.4, delays=2.4/0/0/0.01,
 dsn=4.0.0, status=deferred (delivery temporarily suspended: host
 mail.-.ch[212.90.199.8] refused to talk to me: 421-We are not
 currently accepting connections from 88.198.198.123. 421-Reason for
 temporary block: sending us spam 421 Please try again later. We're
 terminating this connection now.)

This is not gray listing (it would say so if it were), that IP address
did send SPAM to us, and got temporarily blacklisted for it. You can
contact me privately to sort out the specifics ([EMAIL PROTECTED], or
[EMAIL PROTECTED], in order of preference).

Cheers,
Markus
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


[swinog] Looking for CISCO 2511/AS2511-RJ

2007-09-25 Diskussionsfäden Markus Wild
Hi there,

I'm looking for 8-10 of these babies, perferred would be AS2511-RJ (the
ones with builtin RJ45 serial ports), but 2511 _with_ octopus cables
would do too. Routers should have full flash/dram configuration. Anyone
got a pile of these collecting dust in the basement? :)

Cheers,
Markus
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Re: blocking ports?

2007-04-11 Diskussionsfäden Markus Wild
Jonathan,

 Sorry but I disagree with Per.  ISPs have a duty to prevent email
 Spam which is a terrible curse for us all.  If they decide that
 blocking port 25 outbound will help then they should do it.
 
 If you are a user, why can't you use the ISPs relay server? If you
 are a provider you ought to have your own mail server on a fixed IP
 address.

You'd be amazed how many companies operate their own mail servers, even
behind dynamic addresses (in which case they usually use some mailbox
polling mechanism to feed their server from mail from the outside), but
send outgoing mail directly with SMTP.

 Of course, one day we need a better protocol than SMTP (*Simple* Mail 
 Transfer Protocol) which was never meant as a global email solution.  
 But until then we have to do something to stop people abusing it.

But by killing the payload, not the messenger, please... 

Cheers,
Markus
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Any others having troubles with mails being rejected by:mail-fwd.mx.hostcenter.com

2007-03-16 Diskussionsfäden Markus Wild
 Therefore, the interface should be standardized, and the filter
 software should add a header, which provides an URL for the
 interface, to messages which pass through the filter.

Many mail clients (among them those of our favorite business software
vendor...) won't display Mail-Headers in any usable form, probably not
clickable anyway

Cheers,
Markus
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Formmailer-Scripts and Spam

2006-08-16 Diskussionsfäden Markus Wild
 Markus Wild wrote:
  One that is less cumbersome than the type in the word in the weird
  image approach is to set a cookie-like hidden parameter from the
  server when it generates the form (I'm assuming php or perl behind

 Well, IMHO this is no better than my solution using JS
 What do you do if someone has cookies disabled?

I said cookie-like, not cookies:

 input type=hidden name=yourgrandmother value=some encrypted
hash

with some encrypted hash being some encrypted (and binhex64 encoded)
serialized record containing the sending IP, a timestamp and whatever
else you fancy including.

Cheers,
Markus
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Watchguard FB 2 RAM

2005-11-30 Diskussionsfäden Markus Wild
 Does someone know what is the maximum amount of
 RAM the Firebox 2 accepts?
 
 64MB isn't enough for latest jinstall (o;

;-) The FB3 does 256MB, I don't have a bigger module to try with.
And for those who also have a FB3 lying around: the KBD connector
assignment for this baby is:
1- Data
2- GND
3- VCC
4- Clock

The flash geometry reported in the BIOS is 16 sect, 4 hd, 248 cyl.

Cheers,
Markus
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog