Dallas Engelken wrote:
Rob McEwen wrote:
(on-list follow-up)
By "proactive listings", I discovered in my off-list conversation with
Dallas that this refers to URIBL-Gold listings... where items are
listed in "uribl-gold" in advance of seeing them in actual spams. But
this uribl-gold list isn't available to the public and is not even
prescribed as a list to use for fighting spam.
We do ask anyone with access to it to use it. Since its basically
uribl black for domains that we believe will show up in future spam
campaigns, there is no reason not to. I'm sure there are some on this
list that can comment further in regards to its effectiveness.
I'm really disappointed that Dallas would have presented that kind of
comparison to ivmURI. This is like comparing some kid's best
basketball game on an X-Box to Michael Jordan's best basketball game
on the court. I'm glad that URIBL-Gold is helping URIBL black get
better... but until the listing actually makes it into URIBL-Black...
and is then actually *usable* for blocking spam...
From a RBL perspective, the purpose of the data in there is to catch
the front end of spam runs. Assuming it takes ~5 minutes to list,
rebuild, and redistribute new zone data in reactive mode, we could miss
50% of a 10 minute campaign. Obviously the longer the campaign draws
out, the better the miss rate looks. But those using gold+black have
100% hitrates on alot of these campaigns, which is something that is
difficult if not impossible to achieve on a reactive blacklist based
soley on trap data or user feed back.
As you can see at http://www.uribl.com/gold.shtml, over 20% (14k of 57k)
of the domains that have been listed in gold for hours, days, even
weeks, have since moved to black. So, assume each of those 14k
domains returned NXDOMAIN on black.uribl.com for the first ~5 minutes of
each of their campaigns, how much spam do you think we missed? Quite a
lot I'd say. That short window is what we are targetting here. It
doesnt result in a huge hitrate because it only hits in gold during the
rebuild and redistribute window, but it does serve its purpose quite well.
Aside from client side spam filtering, I could see
registries/registrars, web hosts, ip space owners and the like
benefiting from this data as well. Knowing there is potential for abuse
prior to the abuse actually occurs could be quite a powerful tool.
For example, I can tell you that ns1.tuhaerge.com is the next NS that
will be spewing up VPXL crapmail
(http://www.spamtrackers.hk/wiki/index.php?title=VPXL).. That NS and
every domain registred against that NS should be instantly nuked, but
getting those Chinese registrars to action anything like this, even with
proper evidence, is nearly impossible... just think if you asked them to
kill it before the abuse started. ;)
Hi, I just wanted to comment that only a few hours after Dallas sent his
last email we did see that NS spewing junk.
I know it's a little late in response, but I thought I'd pass this info
along to everyone involved in the thread just so you know your work does
appear to be paying off.