I agree that there are lots of compromised ".edu" accounts, and that
some students like to cause trouble. But, when I say I never *see* spam
from ".edu" domains, I mean, if there is any, it gets filtered out by
other means, not that my MTA never receives any.

Also, in the past I *have* corresponded with ".edu". For example, I was
using a Stratum 1 NTP server at MIT (it being nearby, and my being an
MIT grad), and had to communicate with the guy running it.

The only TLDs I currently block are some of the weird new ones, like
'accountant', 'bid', 'club', 'cricket', 'date', 'download', 'men',
'stream', 'top' and 'xyz', as I have no evidence that anything *but*
spam ever comes from them.

P.S. I often look at our mail logs (for our tiny domain), and ".edu"
does not stand out at all. As far as IPTABLES logs, I don't remember
seeing probes from IP addresses which PTR-resolve to ".edu", but I
don't do that a lot (and I certainly don't log every dropped SYN).


On Sun, 18 Jun 2017 18:23:32 +0100 (BST)
"G.W. Haywood" <cla...@jubileegroup.co.uk> wrote:

> Hi there,
> 
> On Sun, 18 Jun 2017, Paul Kosinski wrote:
> > On Fri, 16 Jun 2017 17:22:53 +0100 (BST) "G.W. Haywood" wrote:
> > 
> >> ... We just outright reject all mail from the '.edu' TLD ...
> > 
> > Why do you reject *all* email from ".edu".
> 
> Because all connections we see from .edu are either from compromised
> accounts sending spam or from irresponsible juveniles who think it's
> clever/cool/whatever to try to hack into other people's computers.
> 
> > Doesn't that cut you off from lots of useful technological info?
> 
> Not in the least.  There's a reasonable scientific press, for example.
> 
> > (I don't think I *ever* see spam from ".edu".)
> 
> That seems strange to me.  Generally speaking we have no reason to
> correspond with .edu domains, but even so, apart from hack attempts
> we never see anything else.  Do you actually look for it?  I mean,
> you know, read the logs? :)
> 
> There's an important point here.  Well over 90% of the attacks we see
> are defeated by preventing connections from the sources of the attacks
> simply because they are known sources of attacks.  It's not the only
> technique we use, but even on its own it's more effective, in terms of
> both success rate and processing overhead, than scanning for malicious
> characteristics - which of course we do as well, but only after the
> bulk of the dross has been dropped using a number of other techniques.
> 
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to