Re: Spammers Skirt IP Authentication Attempts

2004-09-08 Thread Rich Kulawiec
On Mon, Sep 06, 2004 at 07:19:01PM -0400, Mark Jeftovic wrote: I'm not sure the people behind this concept (SPF, RMX, et al) ever intended it to be the FUSSP, but a lot of the ensuing enthusiasm built it up to that. Consider that the people behind SPF made this statement (upon introducing

Re: Spammers Skirt IP Authentication Attempts [operational content at end]

2004-09-09 Thread Rich Kulawiec
[ Two replies in one. Last point has operational content. ] On Wed, Sep 08, 2004 at 01:52:59PM +0100, [EMAIL PROTECTED] wrote: I see that 56trf5.com is a real domain. Does this mean that the domain name registries and DNS are now being polluted with piles of garbage entries in the same way

Re: Big List of network owners?

2004-10-29 Thread Rich Kulawiec
On Thu, Oct 28, 2004 at 10:30:43AM -0700, Randy Bush wrote: I have been looking around, but haven't found it yet.. Is there a text list of who owns what netblock worldwide? ISP/Location/Contact. I am not looking for anything searchable, but rather, a large, up to date list that I can

Re: Make love, not spam....

2004-11-29 Thread Rich Kulawiec
On Mon, Nov 29, 2004 at 02:14:01PM +, Fergie (Paul Ferguson) wrote: Techdirt has an article this morning that discusses how Lycos Europe is encouraging their users to run a screensaver that constantly pings servers suspected to be used by spammers and also suggests that In other words,

Re: Make love, not spam....

2004-11-29 Thread Rich Kulawiec
On Mon, Nov 29, 2004 at 10:54:03AM -0600, Jerry Pasker wrote: The big difference between Lycos Europe, and a script kiddie with zombies is that Lycos is mature enough to use restraint and not knock down websites with brute force. I have no idea whether they're mature enough. They're most

Re: How many backbones here are filtering the makelovenotspam screensaver site?

2004-12-02 Thread Rich Kulawiec
The site has already been hacked/defaced, per full-disclosure. I can't personally verify or refute this because I can't reach it. ---Rsk

Re: How many backbones here are filtering the makelovenotspam scr eensaver site?

2004-12-02 Thread Rich Kulawiec
On Thu, Dec 02, 2004 at 04:18:52PM -0500, Hannigan, Martin wrote: Can you direct me toward a singluar entity of 1MM bots controlled by a single master? Nobody can, except the single master who's in control of same, and whoever that is -- if there is -- is unlikely to voluntarily share that

Re: [Fwd: zone transfers, a spammer's dream?]

2004-12-09 Thread Rich Kulawiec
On Thu, Dec 09, 2004 at 03:52:38AM +0200, Gadi Evron wrote: After a much too long introduction here comes my questions: is this deliberate? I can understand that Chad has bigger things to worry about than 24 domains getting on yet another spam list, but why Canada makes nearly half a million

Re: [Fwd: zone transfers, a spammer's dream?]

2004-12-09 Thread Rich Kulawiec
On Thu, Dec 09, 2004 at 04:59:33PM +, Alex Bligh wrote: They clearly don't already have this information, or they wouldn't be a) offering to pay people for it b) continue to be trying to obtain it by data mining. Sure, some of them quite clearly don't. And so they're buying it from

Re: verizon.net and other email grief

2004-12-10 Thread Rich Kulawiec
On Fri, Dec 10, 2004 at 02:43:21PM +, Simon Waters wrote: The most obvious is none of the three UK ISPs I have ready access to can connect to port 25 on relay.verizon.net. (MX for all the verizon.net email addresses). We can ping it (I'm sure it isn't singular?), but we have no more

Re: no whois info ?

2004-12-11 Thread Rich Kulawiec
I don't want to turn this into a domain policy discussion, but here are a few comments (in some semblance of order) which relate to the operational aspects. 1. Anyone controlling an operational resource (such as a domain) can't be anonymous. This _in no way_ prevents anyone from doing things

Re: verizon.net and other email grief

2004-12-12 Thread Rich Kulawiec
Reply (*long* reply) being sent off-list. If anyone else wants to see it, rattle my cage. ---Rsk

Re: no whois info ?

2004-12-12 Thread Rich Kulawiec
I'm going to try to keep this short, hence it's incomplete/choppy. Maybe we should take it to off-list mail with those interested. On Sat, Dec 11, 2004 at 10:06:10PM -0700, Janet Sullivan wrote: Great! So, if you are a vulnerable minority, don't use the internet. I said precisely the

Re: fixing insecure email infrastructure (was: Re: [eweek article] Window of anonym

2005-01-13 Thread Rich Kulawiec
On Thu, Jan 13, 2005 at 12:26:47PM +0100, Stephane Bortzmeyer wrote: 4) all domains with invalid whois data MUST be deactivated (not confiscated, just temporarily removed from the root dbs) immediately and their owners contacted. Because there is no data protection on many databases

Re: Time to check the rate limits on your mail servers

2005-02-03 Thread Rich Kulawiec
On Thu, Feb 03, 2005 at 11:42:55AM +, [EMAIL PROTECTED] wrote: CNET reports http://news.com.com/Zombie+trick+expected+to+send+spam+sky-high/2100-7349_3-5560664.html?tag=cd.top that botnets are now routing their mail traffic through the local ISP's mail servers rather than trying their

Re: Time to check the rate limits on your mail servers

2005-02-03 Thread Rich Kulawiec
On Thu, Feb 03, 2005 at 09:21:19PM +0200, Petri Helenius wrote: Nils Ketelsen wrote: Only thing that puzzles me is, why it took spammers so long to go in this direction. It didn't. It took the media long to notice. Pete's correct. And there's another reason: spammers have long since

Choicepoint [was: Re: Break-In At SAIC Risks ID Theft]

2005-02-15 Thread Rich Kulawiec
It gets worse: Database giant gives access to fake firms http://www.msnbc.msn.com/id/6969799/ ---Rsk

Re: Verizon wins MCI

2005-02-15 Thread Rich Kulawiec
On Mon, Feb 14, 2005 at 11:38:10PM -0500, Jon Lewis wrote: But does anyone really know how big WorldCon is/was? chuckle Well, by one metric, they're #1: RankISP Number of currently-listed spam issues --- ---

Re: Verizon wins MCI

2005-02-15 Thread Rich Kulawiec
On Tue, Feb 15, 2005 at 06:56:54PM +, Christopher L. Morrow wrote: we aim to please? or was there some hidden meaning to your email/troll? 1. I didn't realize that accurately reporting the facts was now considered a troll. Fascinating. 2. Nope, there's no hidden meaning -- unless you're

Re: AOL scomp

2005-02-24 Thread Rich Kulawiec
On Thu, Feb 24, 2005 at 02:53:14PM -0500, Mark Radabaugh wrote: Now here I would disagree. These are specific requests by individuals to forward mail to from one of their own accounts to another one of their own accounts. But a request to forward mail is not a request to facilitate abuse by

Re: AOL scomp

2005-02-26 Thread Rich Kulawiec
On Fri, Feb 25, 2005 at 01:34:21AM -0600, Robert Bonomi wrote: Because the recipient *expressly* requested that all mail which would reach my inbox on your system be sent to me at AOL (or any other somewhere else). I have three somewhat-overlapping responses to that -- and I'll try to stay

Re: Internet Email Services Association ( wasRE: Why do so few mail providers support Port 587?)

2005-02-28 Thread Rich Kulawiec
[ This discussion should be moved to Spam-L. ] On Mon, Feb 28, 2005 at 10:35:53AM +, [EMAIL PROTECTED] wrote: You misunderstand me. I believe *LESS* red tape will mean better service. Today, an email operator has to deal with numerous blacklisting and spam-hunting groups, many of which

[off-list] Re: High volume WHOIS queries

2005-03-01 Thread Rich Kulawiec
On Tue, Mar 01, 2005 at 09:17:48AM -0500, Hannigan, Martin wrote: I don't know that this is the case, I suspect it's resource management. If the database is getting slaughtered by applications on uncontrolled auto pilot, it's unusable for the rest of us. Understood. So why not make it easy

Re: sorbs.net

2005-03-15 Thread Rich Kulawiec
On Tue, Mar 15, 2005 at 11:21:35AM -0800, Randy Bush wrote: o could this be used as a dos and then become extortion? Unlikely. Blocklists are used by choice, and blocklists which either aren't effective or don't have sane policies don't get chosen often. (See BLARS, which even blars was

Re: sorbs.net

2005-03-15 Thread Rich Kulawiec
On Tue, Mar 15, 2005 at 05:44:41PM -0500, Paul G wrote: unfortunately, that *still* didn't stop people from using it, which translated into an unresolvable headache for me as a sp. Then gripe at the people who chose to use it: it was *their* decision, and if it was a poor one, then they are

Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them

2005-03-22 Thread Rich Kulawiec
On Tue, Mar 22, 2005 at 10:24:37AM -0800, Andreas Ott wrote: http://money.cnn.com/2005/03/22/technology/ibm_spam/ If this write-up is accurate, then this is incredibly stupid in multiple ways and on multiple levels. I *hope* that this is just a misperception based on poor writing and that

Re: Utah governor signs Net-porn bill

2005-03-23 Thread Rich Kulawiec
On Tue, Mar 22, 2005 at 03:49:44PM -0700, pashdown wrote: In the end the bill itself doesn't have a big impact on this ISP's business. We have used Dansguardian for many years now along with URLblacklist.com for our customers that request filtering. The fact that its lists and software are

Re: IBM to offer service to bounce unwanted e-mail back to the

2005-03-24 Thread Rich Kulawiec
If FairUCE can't verify sender identity, then it goes into challenge-response mode, sending a challenge email to the sender, Let me rephrase that more accurately: ...spamming everyone who has been so unfortunate as to have their address forged into a mail message...

Re: VerizonWireless.com Mail Blacklists

2005-05-31 Thread Rich Kulawiec
On Thu, May 19, 2005 at 05:24:41PM -0700, Crist Clark wrote: It appears VerizonWireless.com has some rather aggressive mail filters. Verizon is hopelessly clueless when it comes to mail system operations and mail filters -- as evidenced by their ongoing decision to deliberately provide

Re: VerizonWireless.com Mail Blacklists

2005-06-01 Thread Rich Kulawiec
On Tue, May 31, 2005 at 04:46:01PM -, John Levine wrote: VZW recently confirmed that their mail system is separate from VZ's, and whatever mistakes they may make, they're not VZ's. Okay, fine -- and a look at DNS seems to back this up (unless I'm missing something). And I've no desire to

Re: Email peering

2005-06-21 Thread Rich Kulawiec
On Fri, Jun 17, 2005 at 11:48:58AM -0400, Ben Hubbard wrote: You seem to repeatedly describe a solution that becomes so big that it (at least substantially) replaces 25/SMTP. That's what I don't think will work, or is needed. Please let me borrow Ben's point and expand on it. Spam as it's

Re: E-Mail authentication fight looming: Microsoft pushing Sender ID

2005-06-23 Thread Rich Kulawiec
On Wed, Jun 22, 2005 at 06:39:07PM -0700, william(at)elan.net wrote: P.S. It would really be great if IETF remained true to its origin and goals did did technical reviews and selected proposals based on the technical capabilities and not on what large company is exerting pressure on them

Re: E-Mail authentication fight looming: Microsoft pushing Sender ID

2005-07-06 Thread Rich Kulawiec
[late followup, sorry] On Thu, Jun 23, 2005 at 05:42:17AM -0700, Dave Crocker wrote: The real fight is to find ANY techniques that have long-term, global benefit in reducing spam. We've already got them -- we've always had them. What we lack is the guts to *use* them. As we've seen over

Re: Yahoo and Cisco to submit e-mail ID spec to IETF

2005-07-12 Thread Rich Kulawiec
On Mon, Jul 11, 2005 at 02:22:07PM +, Fergie (Paul Ferguson) wrote: Yahoo and Cisco Monday plan to announce they will submit their e-mail authentication specification, DomainKeys Identified Mail (DKIM), to the IETF to be considered as an industry standard. None of these have the

Re: Cisco crapaganda

2005-08-12 Thread Rich Kulawiec
On Tue, Aug 09, 2005 at 04:11:45PM +0100, [EMAIL PROTECTED] wrote: There really is no such thing as closed source. I've been saying this for years, and I'm sure you and I aren't the only ones. Corrallaries: A. If open publication of the full source code of XYZ would render it insecure, then

Re: Cisco crapaganda

2005-09-05 Thread Rich Kulawiec
[late followup] On Sat, Aug 13, 2005 at 07:32:20PM +0100, Dave Howe wrote: Rich Kulawiec wrote: More bluntly: the closed-source, faith-based approach to security doesn't cut it. The attacks we're confronting are being launched (in many cases) by people who *already have the source code

Re: OT: Yahoo- apparently now an extension of the Chinese govt secret police....

2005-09-07 Thread Rich Kulawiec
On Wed, Sep 07, 2005 at 03:10:12PM +0100, [EMAIL PROTECTED] wrote: Every company has to obey the laws of the jurisdictions in which they do business, and for international companies, that list of jurisdictions can be very, very long. Obeying the (local) law is, in most cases, very

Re: Yahoo! -- A Phisher-friendly hosting domain?

2005-09-07 Thread Rich Kulawiec
Two comments. soapbox First, it's everyone's responsibility to do what's necessary to prevent their operation from being an abuse source, vector, or support service. That includes registrars, web hosts, DNS providers, email services, consumer ISPs, webmail services, corporations, end-users --

Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Rich Kulawiec
On Sun, Dec 04, 2005 at 09:58:20AM -0500, Todd Vierling wrote: If it is on by default, it is a bug, and not operator error. (In the case of the Barracuda) there are at least two such switches: one for spam, one for viruses. Note that when both are set to off that the box still occasionally

Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-05 Thread Rich Kulawiec
On Sun, Dec 04, 2005 at 03:18:29PM -0800, Steve Sobol wrote: Blocking based on rDNS simply because it implies that a certain piece of equipment is at that address is... not advisable. Agreed. Those blocks aren't in place because there's a certain piece of equipment at those addresses

Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-05 Thread Rich Kulawiec
On Sun, Dec 04, 2005 at 09:27:58PM -0600, Church, Chuck wrote: What about all the viruses out there that don't forge addresses? Three responses. First, these are pretty much a minority nowadays: so unless someone wants to code AV responses on a case-by-case basis, the best default is don't

Re: SMTP store and forward requires DSN for integrity (was Re:Clueless anti-virus )

2005-12-10 Thread Rich Kulawiec
On Fri, Dec 09, 2005 at 09:03:10AM -0800, Douglas Otis wrote: There is a solution you can implement now that gets rid of these tens of thousands of virus and abuse laden DSNs you see every day before the data phase. BATV is not a solution. It's a band-aid. It fails to address the underlying

Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-10 Thread Rich Kulawiec
On Wed, Dec 07, 2005 at 02:15:00PM -0800, Douglas Otis wrote: When auth fails, one knows *right then* c/o an SMTP reject. No bounce is necessary. This assumes all messages are rejected within the SMTP session. Yes, exactly and the point several of us have been making is that this is (a)

Re: SMTP store and forward requires DSN for integrity

2005-12-11 Thread Rich Kulawiec
I agree with nearly all of your analysis, but want to add a few small points of my own. On Sun, Dec 11, 2005 at 04:53:03AM -0600, Micheal Patterson wrote: Can BATV correct this? Possibly. After reading further and thinking about it: I believe the answer isn't possibly, but almost certainly

Re: Multi ISP DDOS

2006-05-04 Thread Rich Kulawiec
On Thu, May 04, 2006 at 08:21:04PM -0400, Martin Hannigan wrote: The killer here is that they asked a lot of people a year ago whether this was a good idea and everyone said no. Agreed. It's just the latest in the series of fiascos that we've seen when people try to respond to abuse with

Re: SORBS Contact

2006-08-09 Thread Rich Kulawiec
On Wed, Aug 09, 2006 at 03:42:32PM -0600, Allan Poindexter wrote: Far more damage has been done to the functionality of email by antispam kookery than has ever been done by spammers. That is not even good enough to be wrong. ---Rsk, with apologies to Enrico Fermi

Re: SORBS Contact

2006-08-10 Thread Rich Kulawiec
On Wed, Aug 09, 2006 at 10:29:52PM -0500, Robert J. Hantson wrote: So with all this talk of Blacklists... does anyone have any suggestions that would be helpful to curb the onslaught of email, without being an adminidictator? Yes. First, run a quality MTA -- that *requires* an open-source

Re: register.com down sev0?

2006-10-26 Thread Rich Kulawiec
On Thu, Oct 26, 2006 at 12:14:43AM -0400, [EMAIL PROTECTED] wrote: On 26 Oct 2006, Paul Vixie wrote: i wonder if that's due to the spam they've been sending out? Paul, this isn't nanae. Let's not sling accusations like that wildly. There's nothing wild about it -- Paul is one of the most

Re: Best Email Time

2006-12-09 Thread Rich Kulawiec
On Fri, Dec 08, 2006 at 07:50:57AM -0500, David Hester wrote: CNN recently reported that 90% of all email on the internet is spam. http://www.cnn.com/2006/WORLD/europe/11/27/uk.spam.reut/index.html CNN is behind the times. We passed 90% junk (spam, viruses, bogus virus warnings, worms,

Re: Phishing and BGP Blackholing

2007-01-03 Thread Rich Kulawiec
On Wed, Jan 03, 2007 at 05:44:28PM +1300, Mark Foster wrote: So why the big deal? Because it's very rude -- like top-posting, or full-quoting, or sending email marked up with HTML. Because it's an unprovoked threat. Because it's an attempt to unilaterally shove an unenforceable contract down

Re: what the heck do i do now?

2007-02-01 Thread Rich Kulawiec
On Wed, Jan 31, 2007 at 07:04:37PM -0800, Matthew Kaufman wrote: (As an example, consider what happens *to you* if a hospital stops getting emailed results back from their outside laboratory service because their email firewall is checking your server, and someone dies as a result of the

Re: what the heck do i do now?

2007-02-01 Thread Rich Kulawiec
We've told people for years that when they choose to use a DNSBL or RHSBL that they need to (a) subscribe to the relevant mailing list, if it has one and/or (b) periodically revisit the relevant web site, if it has one, so that they can keep themselves informed about any changes in its status or

Re: Anyone with SMTP clue at Verizon Wireless / Vtext?

2007-02-08 Thread Rich Kulawiec
On Wed, Feb 07, 2007 at 06:25:41PM -0800, Mike Lyon wrote: Their gateway is blocking mail from my host. Of course, there is no clueful contact info on their webpage... I know you asked for off-list, but since this (mail to Verizon refused) is a recurring problem, I'm sending this on-list as

Re: an RBL for virus alert senders?

2007-02-10 Thread Rich Kulawiec
On Sat, Feb 10, 2007 at 10:02:45AM -0500, Mark Jeftovic wrote: Is there an RBL for mail servers run by brain dead postmasters that insist on running anti-viral software that sends out less-than-useless virus alerts, virus in your email, banned attachment spewage to the

Re: Every incident is an opportunity (was Re: Hackers hit key Internet traffic computers)

2007-02-12 Thread Rich Kulawiec
My two (and a half) cents. 1. Systems that need a firewall, antivirus and antispyware software added on to survive for more than a few minutes SHOULD NOT BE CONNECTED TO THE INTERNET IN THE FIRST PLACE. They're simply not good enough. It's like bringing a knife to a gunfight. (nod to Mr.

Re: botnets: web servers, end-systems and Vint Cerf [LONG, sorry]

2007-02-19 Thread Rich Kulawiec
I really don't want to get into an OS debate here, but this does have major operational impact, so I will anyway but will be as brief as possible. Please see second (whitespace-separated) section for some sample hijacked system statistics which may or may not reflect overall network population.

Re: botnets: web servers, end-systems and Vint Cerf [LONG, sorry]

2007-02-20 Thread Rich Kulawiec
On Mon, Feb 19, 2007 at 02:04:13PM +, Simon Waters wrote: I simply don't believe the higher figures bandied about in the discussion for compromised hosts. Certainly Microsoft's malware team report a high level of trojans around, but they include things like the Jar files downloaded onto

Re: Counting tells you if you are making progress

2007-02-28 Thread Rich Kulawiec
On Wed, Feb 21, 2007 at 12:31:30AM -0500, Sean Donelan wrote: Counting IP addresses tends to greatly overestimate and underestimate the problem of compromised machines. It tends to overestimate the problem in networks with large dynamic pools of IP addresses as a few compromised machines

Re: Possibly OT, definately humor. rDNS is to policy set by federal law.

2007-03-16 Thread Rich Kulawiec
On Thu, Mar 15, 2007 at 07:41:58PM -0700, S. Ryan wrote: However, while it's not really above me to do the same, he could have removed the email address so spammers aren't adding to that guys list of problems. Anti-spam strategies based on concealment and/or obfuscation of addresses are no

Re: Abuse procedures... Reality Checks

2007-04-07 Thread Rich Kulawiec
On Sat, Apr 07, 2007 at 02:31:25PM -0500, Frank Bulk wrote: I understand your frustration and appreciate your efforts to contact the sources of abuse, but why indiscriminately block a larger range of IPs than what is necessary? 1. There's nothing indiscriminate about it. I often block

Re: Abuse procedures... Reality Checks

2007-04-10 Thread Rich Kulawiec
On Sat, Apr 07, 2007 at 09:50:34PM +, Fergie wrote: I would have to respectfully disagree with you. When network operators do due diligence and SWIP their sub-allocations, they (the sub-allocations) should be authoritative in regards to things like RBLs. After thinking it over: I

Re: Abuse procedures... Reality Checks

2007-04-10 Thread Rich Kulawiec
On Sat, Apr 07, 2007 at 04:20:59PM -0500, Frank Bulk wrote: Define network operator: the AS holder for that space or the operator of that smaller-than-slash-24 sub-block? If the problem consistently comes from /29 why not just leave the block in and be done with it? Because

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Rich Kulawiec
On Tue, Apr 10, 2007 at 07:44:59AM -0500, Frank Bulk wrote: Comcast is known to emit lots of abuse -- are you blocking all their networks today? All? No. But I shouldn't find it necessary to block ANY, and wouldn't, if Comcast wasn't so appallingly negligent. ( I'm blocking huge swaths of

Re: Abuse procedures... Reality Checks

2007-04-11 Thread Rich Kulawiec
On Wed, Apr 11, 2007 at 03:44:01PM -0400, Warren Kumari wrote: The same thing happens with things like abuse -- it is easy to deal with abuse on a small scale. It is somewhat harder on a medium scale and harder still on a large scale -- the progression from small to medium to large is

Re: Abuse procedures... Reality Checks

2007-04-13 Thread Rich Kulawiec
On Sat, Apr 07, 2007 at 05:12:19PM -0500, Frank Bulk wrote: If they're properly SWIPed why punish the ISP for networks they don't even punish? Since when is it punishment to refuse to extend a privilege that's been repeatedly and systematically abused? (You have of course, absolutely no right

Re: unwise filtering policy from cox.net

2007-11-21 Thread Rich Kulawiec
On Wed, Nov 21, 2007 at 06:51:42AM +, Paul Ferguson wrote: Sure, it's an unfortunate limitation, but I hardly think it's an issue to hand-wave about and say oh, well. Suggestions? There are numerous techniques available for addressing this problem. Which one(s) to use depends on the

Re: Creating a crystal clear and pure Internet

2007-11-27 Thread Rich Kulawiec
On Tue, Nov 27, 2007 at 09:38:40AM -0500, Sean Donelan wrote: Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Yes -- well,

Re: [EMAIL PROTECTED]

2008-01-18 Thread Rich Kulawiec
On Fri, Jan 18, 2008 at 09:43:35AM -0800, Mike Lyon wrote: Could someone who reads (or is suppose to read...) empty the mailbox over at [EMAIL PROTECTED] It would appear that little has changed: The following addresses had delivery problems: [EMAIL PROTECTED] Permanent Failure:

Re: mtu mis-match

2008-03-20 Thread Rich Kulawiec
On Wed, Mar 19, 2008 at 12:05:19PM -0700, ann kok wrote: Some DSL clients, some are working fine. (browsing...ping ...) Some DSL clients have this problem they can't browse the sites. they can ssh the host but couldn't run the command in the shell prompt ping packet are working fine (no

Re: spam wanted :)

2008-04-10 Thread Rich Kulawiec
On Thu, Apr 10, 2008 at 06:32:53PM +0900, Randy Bush wrote: for a measurement experiment, i would like O(100k) *headers* from spam from europe and a similar sample from the states. Request for clarification: do you mean spam originating at IP addresses believed to be in Europe or spam received

Re: Problems sending mail to yahoo?

2008-04-10 Thread Rich Kulawiec
On Thu, Apr 10, 2008 at 01:30:06PM -0400, Barry Shein wrote: Is it just us or are there general problems with sending email to yahoo in the past few weeks? It's not you. Lots of people are seeing this, as Yahoo's mail servers are apparently too busy sending ever-increasing quantities of spam

Re: Yahoo Mail Update

2008-04-10 Thread Rich Kulawiec
On Thu, Apr 10, 2008 at 05:51:23PM -0700, chuck goolsbee wrote: Thanks for the update Jared. I can understand your request to not be used as a proxy, but it exposes the reason why Yahoo is thought to be clueless: They are completely opaque. They can not exist in this community without

Re: Problems sending mail to yahoo?

2008-04-11 Thread Rich Kulawiec
On Thu, Apr 10, 2008 at 11:58:05PM -0400, Rob Szarka wrote: I report dozens of spams from my personal account alone every day and never receive anything other than automated messages claiming to have dealt with the same abuse that continues around the clock or, worse, bogus/clueless claims

Re: /24 blocking by ISPs - Re: Problems sending mail to yahoo?

2008-04-12 Thread Rich Kulawiec
On Sat, Apr 12, 2008 at 09:36:43AM -0700, Matthew Petach wrote: *heh* And yet just last year, Yahoo was loudly dennounced for keeping logs that allowed the Chinese government to imprison political dissidents. Talk about damned if you do, damned if don't... But those are very different kinds

Re: Yahoo Mail Update

2008-04-13 Thread Rich Kulawiec
On Sun, Apr 13, 2008 at 12:58:59AM -0500, Ross wrote: On Thu, Apr 10, 2008 at 8:54 PM, Rich Kulawiec [EMAIL PROTECTED] wrote: I heartily second this. Yahoo (and Hotmail) (and Comcast and Verizon) mail system personnel should be actively participating here, on mailop, on spam-l, etc

Re: Problems sending mail to yahoo?

2008-04-13 Thread Rich Kulawiec
On Sun, Apr 13, 2008 at 08:04:12PM -0400, Barry Shein wrote: A number of things that are true, including: I say the core problem in spam are the botnets capable of delivering on the order of 100 billion msgs/day. But I say the core problem is deeper. Spam is merely a symptom of an

Re: Yahoo Mail Update

2008-04-14 Thread Rich Kulawiec
On Sun, Apr 13, 2008 at 03:55:13PM -0500, Ross wrote: Again I disagree with the principle that this list should be used for mail operation issues but maybe I'm just in the wrong here. I don't think you're getting what I'm saying, although perhaps I'm not saying it very well. What I'm saying

Re: the O(N^2) problem

2008-04-14 Thread Rich Kulawiec
On Mon, Apr 14, 2008 at 01:41:50PM +, Edward B. DREGER wrote: When one accepts an email[*], one wishes for some sort of _a priori_ information regarding message trustworthiness. DKIM can vouch for message authenticity, but not trust. At the moment, this problem can't be solved on an

Re: Abuse response [Was: RE: Yahoo Mail Update]

2008-04-15 Thread Rich Kulawiec
I largely concur with the points that Paul's making, and would like to augment them with these: - Automation is far less important than clue. Attempting to compensate for lack of a sufficient number of sufficiently-intelligent, experienced, diligent staff with automation is a known-losing

Re: Abuse response

2008-04-15 Thread Rich Kulawiec
On Tue, Apr 15, 2008 at 02:01:26PM +0100, [EMAIL PROTECTED] wrote: - Automation is far less important than clue. Attempting to compensate for lack of a sufficient number of sufficiently- intelligent, experienced, diligent staff with automation is a known-losing strategy, as anyone who

Re: Abuse response [Was: RE: Yahoo Mail Update]

2008-04-15 Thread Rich Kulawiec
On Tue, Apr 15, 2008 at 11:22:59AM -0400, William Herrin wrote: There's a novel idea. Require incoming senior staff at an email company to work a month at the abuse desk before they can assume the duties for which they were hired. My hunch says that's a non-starter. It also doesn't keep

Re: Abuse response [Was: RE: Yahoo Mail Update]

2008-04-16 Thread Rich Kulawiec
On Tue, Apr 15, 2008 at 08:49:39PM -0400, Martin Hannigan wrote: Abuse desk is a $0 revenue operation. Is it not obvious what the issue is? Two points, the first of which is addressed to this and the second of which is more of a recommended attitude. 1. There is no doubt that many operations

Re: Abuse response [Was: RE: Yahoo Mail Update]

2008-04-16 Thread Rich Kulawiec
On Wed, Apr 16, 2008 at 11:07:42AM +0100, [EMAIL PROTECTED] wrote: If people had succeeded in cleaning up the abuse problems in 1995 when the human touch was still feasible, we would not have the situation that we have today. Automation is the only way to address the flood of abuse email, the