On Sep 2, 2010, at 9:08 PM, Jack Bates wrote: > Patrick W. Gilmore wrote: >>> We should be seeking to stop damaging the network for ineffective anti spam >>> measures (blocking outbound 25 for example) rather than to expand this >>> practice to bidirectional brokenness. >> Since at least part of your premise ('ineffective anti-spam measures') has >> been objectively proven false to fact for many years, I guess we can ignore >> the rest of your note. > > He's right though. tcp/25 blocks are a hack. Easy man's way out. Honestly, > it'd be nicer if edge or even core systems could easily handle higher level > filtering for things like this. There's plenty of systems that watch traffic > patterns and issue blocks based on those patterns. > > I was working with a hotel today concerning just that. They were only doing a > generic 500 connections in x period, block mac. They are now adding a tighter > rule for 15 tcp/25 connections in 1 minute, block tcp/25 (or mac, doesn't > matter to me). Of course, we didn't see valid reasons for mail blasts to be > leaving a hotel and 15/minute is plenty of grace for a normal user. At an ISP > level, it would work fine, though methods for determining exceptions would > have to be planned (though that could easily be handled by customer > classifications like everything else). > This seems to me like it would be much more effective and less damaging without being significantly harder to implement.
>> Also, just so everyone doesn't think I'm in favor of "damaging" the network, >> I would much prefer a completely open 'Net. Who wouldn't? Since that is >> not possible, we have to do what we can to damage the network as little as >> possible. Port 25 blocking is completely unnoticeable to something on the >> order of 5-nines worth of users, and the rest should know how to get around >> it with a minimum of fuss (including things like "ask your provider to >> unblock" in many cases). > > Blocking inbound vs outbound is another story, though. Getting people to > implement spoof protections is more useful. I'd be interested to see your > data for concluding 5-nines of users, or did you just make that up? > I'm all for anti-spoof (BCP-38) and strict/loose (as appropriate) RPF. I implement those things on networks I run. That's not damage, that's blocking things that shouldn't happen. I'd also like to see his data to support his claim that it is somehow effective at reducing spam. Owen