Re: [WISPA] domain spam attack - JoeJob

2009-12-30 Thread Ugo Bellavance
On 2009-12-30 10:31, Kurt Fankhauser wrote:
 Does anyone have any experience with having an attack done on your domain
 where the sender spoofs the header and then puts your domain in it as the
 sender. I think this is called a JoeJob and we are getting 1000's of the
 bounced messages because of it and are now having difficulty sending to some
 of the bigger email providers like aol, yahoo, and hotmail. I tracked the
 originating IP down to somewhere in Asia and reported them to the holder of
 the Whois information there. Anything else I can do?

BarricadeMX has a mechanism for that.  All the outgoing mail must go 
through it, though, to be able to make it work.

http://www.fsl.com/index.php/barricademx/barricademx

It also works very, very well to cut inbound spam.

Regards,

Ugo




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] domain spam attack - JoeJob

2009-12-30 Thread Matt
 Does anyone have any experience with having an attack done on your domain
 where the sender spoofs the header and then puts your domain in it as the
 sender. I think this is called a JoeJob and we are getting 1000's of the
 bounced messages because of it and are now having difficulty sending to some
 of the bigger email providers like aol, yahoo, and hotmail. I tracked the
 originating IP down to somewhere in Asia and reported them to the holder of
 the Whois information there. Anything else I can do?

Setup an SPF record.

http://www.openspf.org/

Matt



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


[WISPA] domain spam attack - JoeJob

2009-12-29 Thread Kurt Fankhauser
Does anyone have any experience with having an attack done on your domain
where the sender spoofs the header and then puts your domain in it as the
sender. I think this is called a JoeJob and we are getting 1000's of the
bounced messages because of it and are now having difficulty sending to some
of the bigger email providers like aol, yahoo, and hotmail. I tracked the
originating IP down to somewhere in Asia and reported them to the holder of
the Whois information there. Anything else I can do?

 

Kurt Fankhauser
WAVELINC
P.O. Box 126
Bucyrus, OH 44820
419-562-6405
www.wavelinc.com

 

 

 




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Nick Olsen
Not really. Being in Asia and all.
We have had this happen to us before. Just have to wait for them to go 
away.

Nick Olsen
Brevard Wireless
(321) 205-1100 x106




From: Kurt Fankhauser k...@wavelinc.com
Sent: Tuesday, December 29, 2009 10:32 AM
To: WISPA General List wireless@wispa.org
Subject: [WISPA] domain spam attack - JoeJob

Does anyone have any experience with having an attack done on your domain
where the sender spoofs the header and then puts your domain in it as the
sender. I think this is called a JoeJob and we are getting 1000's of the
bounced messages because of it and are now having difficulty sending to 
some
of the bigger email providers like aol, yahoo, and hotmail. I tracked the
originating IP down to somewhere in Asia and reported them to the holder 
of
the Whois information there. Anything else I can do?

Kurt Fankhauser
WAVELINC
P.O. Box 126
Bucyrus, OH 44820
419-562-6405
www.wavelinc.com



WISPA Wants You! Join today!
http://signup.wispa.org/



WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/





WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Matt Hardy
You can implement the use of SPF records in your dns/mx settings. This
will tell mail servers which use SPF checking (which many do) to only
allow mail from your domain name to come from the mail servers / IPs
that you specify (in the SPF records) are allowed. Any mail coming from
non-allowed IPs are blocked...

-Matt 

On Wed, 2009-12-30 at 10:31 -0500, Kurt Fankhauser wrote:
 Does anyone have any experience with having an attack done on your domain
 where the sender spoofs the header and then puts your domain in it as the
 sender. I think this is called a JoeJob and we are getting 1000's of the
 bounced messages because of it and are now having difficulty sending to some
 of the bigger email providers like aol, yahoo, and hotmail. I tracked the
 originating IP down to somewhere in Asia and reported them to the holder of
 the Whois information there. Anything else I can do?
 
  
 
 Kurt Fankhauser
 WAVELINC
 P.O. Box 126
 Bucyrus, OH 44820
 419-562-6405
 www.wavelinc.com
 
  
 
 
 
 
 
 
 
 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 
  
 WISPA Wireless List: wireless@wispa.org
 
 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless
 
 Archives: http://lists.wispa.org/pipermail/wireless/




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Tom DeReggi
You cant do anything to stop blocking them from being forged and sent, but 
there are things you can do to help notify other ISPs what servers are 
authorized to send mail for your domain, so that they can use smarter 
methods to block and allow SPAM. For example, you can use a Sender Policy 
Framework record in your Domain headers. Some recipient servers have 
different rules on whether they just drop or return SPAM, dependant on 
detection method.

IF similar methods are already being done, and the messages are being sent 
back to you after being blocked, and getting flooded with the bounce 
messages, probably not much can do, other than to set up a temp rule to drop 
those specific bounce message group.

Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message - 
From: Kurt Fankhauser k...@wavelinc.com
To: 'WISPA General List' wireless@wispa.org
Sent: Wednesday, December 30, 2009 10:31 AM
Subject: [WISPA] domain spam attack - JoeJob


 Does anyone have any experience with having an attack done on your domain
 where the sender spoofs the header and then puts your domain in it as the
 sender. I think this is called a JoeJob and we are getting 1000's of the
 bounced messages because of it and are now having difficulty sending to 
 some
 of the bigger email providers like aol, yahoo, and hotmail. I tracked the
 originating IP down to somewhere in Asia and reported them to the holder 
 of
 the Whois information there. Anything else I can do?



 Kurt Fankhauser
 WAVELINC
 P.O. Box 126
 Bucyrus, OH 44820
 419-562-6405
 www.wavelinc.com









 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 

 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/


 -- 
 Internal Virus Database is out-of-date.
 Checked by AVG.
 Version: 7.5.560 / Virus Database: 270.12.26/2116 - Release Date: 
 5/15/2009 6:16 AM

 




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Terry Hickey
I use MailScanner http://www.mailscanner.info/ . It allows you to put a 
watermark on all messages leaving your mailserver. If a bounce come in 
without the watermark , it trashes it . works like a charm for exactly 
that.

Terry

- Original Message - 
From: Nick Olsen n...@brevardwireless.com
To: WISPA General List wireless@wispa.org
Sent: Tuesday, December 29, 2009 8:54 AM
Subject: Re: [WISPA] domain spam attack - JoeJob


 Not really. Being in Asia and all.
 We have had this happen to us before. Just have to wait for them to go
 away.

 Nick Olsen
 Brevard Wireless
 (321) 205-1100 x106


 

 From: Kurt Fankhauser k...@wavelinc.com
 Sent: Tuesday, December 29, 2009 10:32 AM
 To: WISPA General List wireless@wispa.org
 Subject: [WISPA] domain spam attack - JoeJob

 Does anyone have any experience with having an attack done on your domain
 where the sender spoofs the header and then puts your domain in it as the
 sender. I think this is called a JoeJob and we are getting 1000's of the
 bounced messages because of it and are now having difficulty sending to
 some
 of the bigger email providers like aol, yahoo, and hotmail. I tracked the
 originating IP down to somewhere in Asia and reported them to the holder
 of
 the Whois information there. Anything else I can do?

 Kurt Fankhauser
 WAVELINC
 P.O. Box 126
 Bucyrus, OH 44820
 419-562-6405
 www.wavelinc.com

 
 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 
 

 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/




 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 

 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/ 




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Nick Olsen
This assumes that the receiving party drops mail based on SPF.
And still, most of the time it will bounce the message saying it failed 
spam checks or something like that.

Nick Olsen
Brevard Wireless
(321) 205-1100 x106




From: Matt Hardy mha...@ligowave.com
Sent: Tuesday, December 29, 2009 11:08 AM
To: WISPA General List wireless@wispa.org
Subject: Re: [WISPA] domain spam attack - JoeJob

You can implement the use of SPF records in your dns/mx settings. This
will tell mail servers which use SPF checking (which many do) to only
allow mail from your domain name to come from the mail servers / IPs
that you specify (in the SPF records) are allowed. Any mail coming from
non-allowed IPs are blocked...

-Matt 

On Wed, 2009-12-30 at 10:31 -0500, Kurt Fankhauser wrote:
 Does anyone have any experience with having an attack done on your 
domain
 where the sender spoofs the header and then puts your domain in it as 
the
 sender. I think this is called a JoeJob and we are getting 1000's of the
 bounced messages because of it and are now having difficulty sending to 
some
 of the bigger email providers like aol, yahoo, and hotmail. I tracked 
the
 originating IP down to somewhere in Asia and reported them to the holder 
of
 the Whois information there. Anything else I can do?
 
  
 
 Kurt Fankhauser
 WAVELINC
 P.O. Box 126
 Bucyrus, OH 44820
 419-562-6405
 www.wavelinc.com
 
  
 
 
 
 
 
 
 
 


 WISPA Wants You! Join today!
 http://signup.wispa.org/
 


  
 WISPA Wireless List: wireless@wispa.org
 
 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless
 
 Archives: http://lists.wispa.org/pipermail/wireless/



WISPA Wants You! Join today!
http://signup.wispa.org/



WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/





WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Matt Hardy
You're right, it does require the recipient domain to implement SPF
checking, but I think it's better than nothing.

It could at least help prevent from having your domain name end up on
some auto-populated spam lists like aol, yahoo, etc like he originally
said he was having problems with... although usually I've seen that
happen with IPs rather than domain names themselves. 

-Matt

On Tue, 2009-12-29 at 11:24 -0500, Nick Olsen wrote:
 This assumes that the receiving party drops mail based on SPF.
 And still, most of the time it will bounce the message saying it failed 
 spam checks or something like that.
 
 Nick Olsen
 Brevard Wireless
 (321) 205-1100 x106
 
 
 
 
 From: Matt Hardy mha...@ligowave.com
 Sent: Tuesday, December 29, 2009 11:08 AM
 To: WISPA General List wireless@wispa.org
 Subject: Re: [WISPA] domain spam attack - JoeJob
 
 You can implement the use of SPF records in your dns/mx settings. This
 will tell mail servers which use SPF checking (which many do) to only
 allow mail from your domain name to come from the mail servers / IPs
 that you specify (in the SPF records) are allowed. Any mail coming from
 non-allowed IPs are blocked...
 
 -Matt 
 
 On Wed, 2009-12-30 at 10:31 -0500, Kurt Fankhauser wrote:
  Does anyone have any experience with having an attack done on your 
 domain
  where the sender spoofs the header and then puts your domain in it as 
 the
  sender. I think this is called a JoeJob and we are getting 1000's of the
  bounced messages because of it and are now having difficulty sending to 
 some
  of the bigger email providers like aol, yahoo, and hotmail. I tracked 
 the
  originating IP down to somewhere in Asia and reported them to the holder 
 of
  the Whois information there. Anything else I can do?
  
   
  
  Kurt Fankhauser
  WAVELINC
  P.O. Box 126
  Bucyrus, OH 44820
  419-562-6405
  www.wavelinc.com
  
   
  
  
  
  
  
  
  
  
 
 
  WISPA Wants You! Join today!
  http://signup.wispa.org/
  
 
 
   
  WISPA Wireless List: wireless@wispa.org
  
  Subscribe/Unsubscribe:
  http://lists.wispa.org/mailman/listinfo/wireless
  
  Archives: http://lists.wispa.org/pipermail/wireless/
 
 
 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 
 
 
 WISPA Wireless List: wireless@wispa.org
 
 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless
 
 Archives: http://lists.wispa.org/pipermail/wireless/
 
 
 
 
 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 
  
 WISPA Wireless List: wireless@wispa.org
 
 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless
 
 Archives: http://lists.wispa.org/pipermail/wireless/




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Tom DeReggi
The watermark idea sounds like a clever idea, and worthy solution.

Only thing, should consider whether you let your mail users send through 
other providers during travel or secondary locations. (Would also apply to 
SPF to some extent).
If they send legitimate mail from their hotel or Home circuit (if it was 
originally an Office account/circuit with you, but bring laptop home also), 
which home provider blocks SMTP excpet for using Access provider's SMTP 
server, the legitimate sender will no longer get notice when a send was 
unsuccessful.  SMTP Auth is not always a winning solution, when Port 25 gets 
blocked.

So it boils down to... Do you want to set policy to only support mail if 
sent through your own mail server? Thats a personal decission.
But it could also be addressed by how the watermark gets delt with.

For example, what if the watermark rule was used, BUT it accepted the first 
5 bounces within a define period of time, and then auto blocked all future 
bounces for a defined period of time?
That would be better because it allows getting a few of the bounces for 
management, but also limits the number of harmful bounces.

We use similar techniques with Blacklisting.  We let first few through, and 
then when threshhold is exceeded we temporarilly blacklist sender for like 
12 hours.
That is very effective in managing SPAM and DDOS. Unforunteately, it is not 
a good way to prevent poor reputation ratings that rely on other provider's 
systems that accept and weight to heavilly What is SPAM submissions from 
their end users.


Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message - 
From: Terry Hickey thic...@rockies.net
To: WISPA General List wireless@wispa.org
Sent: Tuesday, December 29, 2009 11:20 AM
Subject: Re: [WISPA] domain spam attack - JoeJob


I use MailScanner http://www.mailscanner.info/ . It allows you to put a
 watermark on all messages leaving your mailserver. If a bounce come in
 without the watermark , it trashes it . works like a charm for exactly
 that.

 Terry

 - Original Message - 
 From: Nick Olsen n...@brevardwireless.com
 To: WISPA General List wireless@wispa.org
 Sent: Tuesday, December 29, 2009 8:54 AM
 Subject: Re: [WISPA] domain spam attack - JoeJob


 Not really. Being in Asia and all.
 We have had this happen to us before. Just have to wait for them to go
 away.

 Nick Olsen
 Brevard Wireless
 (321) 205-1100 x106


 

 From: Kurt Fankhauser k...@wavelinc.com
 Sent: Tuesday, December 29, 2009 10:32 AM
 To: WISPA General List wireless@wispa.org
 Subject: [WISPA] domain spam attack - JoeJob

 Does anyone have any experience with having an attack done on your domain
 where the sender spoofs the header and then puts your domain in it as the
 sender. I think this is called a JoeJob and we are getting 1000's of the
 bounced messages because of it and are now having difficulty sending to
 some
 of the bigger email providers like aol, yahoo, and hotmail. I tracked the
 originating IP down to somewhere in Asia and reported them to the holder
 of
 the Whois information there. Anything else I can do?

 Kurt Fankhauser
 WAVELINC
 P.O. Box 126
 Bucyrus, OH 44820
 419-562-6405
 www.wavelinc.com

 
 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 
 

 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/




 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 

 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/



 
 WISPA Wants You! Join today!
 http://signup.wispa.org/
 

 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/


 -- 
 Internal Virus Database is out-of-date.
 Checked by AVG.
 Version: 7.5.560 / Virus Database: 270.12.26/2116 - Release Date: 
 5/15/2009 6:16 AM

 




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail

Re: [WISPA] domain spam attack - JoeJob

2009-12-29 Thread Richey
 If they send legitimate mail from their hotel or Home circuit (if it was
originally an Office account/circuit with you, but bring laptop home also),
which home provider blocks SMTP excpet for using Access provider's SMTP
server, the legitimate sender will no longer get notice when a send was
unsuccessful.  SMTP Auth is not always a winning solution, when Port 25 gets
blocked.

Most mail servers will support both SMTP Authentication and alternate SMTP
ports.  Port 587 is supposed to be a standard alternate port for SMTP.  We
have our roaming users replace port 25 with 587 and enable SMTP
authentication which seems to work very well.   

Richey

-Original Message-
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
Behalf Of Tom DeReggi
Sent: Tuesday, December 29, 2009 1:48 PM
To: WISPA General List
Subject: Re: [WISPA] domain spam attack - JoeJob

The watermark idea sounds like a clever idea, and worthy solution.

Only thing, should consider whether you let your mail users send through
other providers during travel or secondary locations. (Would also apply to
SPF to some extent).
If they send legitimate mail from their hotel or Home circuit (if it was
originally an Office account/circuit with you, but bring laptop home also),
which home provider blocks SMTP excpet for using Access provider's SMTP
server, the legitimate sender will no longer get notice when a send was
unsuccessful.  SMTP Auth is not always a winning solution, when Port 25 gets
blocked.

So it boils down to... Do you want to set policy to only support mail if
sent through your own mail server? Thats a personal decission.
But it could also be addressed by how the watermark gets delt with.

For example, what if the watermark rule was used, BUT it accepted the first
5 bounces within a define period of time, and then auto blocked all future
bounces for a defined period of time?
That would be better because it allows getting a few of the bounces for
management, but also limits the number of harmful bounces.

We use similar techniques with Blacklisting.  We let first few through, and
then when threshhold is exceeded we temporarilly blacklist sender for like
12 hours.
That is very effective in managing SPAM and DDOS. Unforunteately, it is not
a good way to prevent poor reputation ratings that rely on other provider's
systems that accept and weight to heavilly What is SPAM submissions from
their end users.


Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message -
From: Terry Hickey thic...@rockies.net
To: WISPA General List wireless@wispa.org
Sent: Tuesday, December 29, 2009 11:20 AM
Subject: Re: [WISPA] domain spam attack - JoeJob


I use MailScanner http://www.mailscanner.info/ . It allows you to put a
 watermark on all messages leaving your mailserver. If a bounce come in
 without the watermark , it trashes it . works like a charm for exactly
 that.

 Terry

 - Original Message - 
 From: Nick Olsen n...@brevardwireless.com
 To: WISPA General List wireless@wispa.org
 Sent: Tuesday, December 29, 2009 8:54 AM
 Subject: Re: [WISPA] domain spam attack - JoeJob


 Not really. Being in Asia and all.
 We have had this happen to us before. Just have to wait for them to go
 away.

 Nick Olsen
 Brevard Wireless
 (321) 205-1100 x106


 

 From: Kurt Fankhauser k...@wavelinc.com
 Sent: Tuesday, December 29, 2009 10:32 AM
 To: WISPA General List wireless@wispa.org
 Subject: [WISPA] domain spam attack - JoeJob

 Does anyone have any experience with having an attack done on your domain
 where the sender spoofs the header and then puts your domain in it as the
 sender. I think this is called a JoeJob and we are getting 1000's of the
 bounced messages because of it and are now having difficulty sending to
 some
 of the bigger email providers like aol, yahoo, and hotmail. I tracked the
 originating IP down to somewhere in Asia and reported them to the holder
 of
 the Whois information there. Anything else I can do?

 Kurt Fankhauser
 WAVELINC
 P.O. Box 126
 Bucyrus, OH 44820
 419-562-6405
 www.wavelinc.com



 
 WISPA Wants You! Join today!
 http://signup.wispa.org/


 

 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/







 WISPA Wants You! Join today!
 http://signup.wispa.org/




 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless