>>From [EMAIL PROTECTED] Wed Jan 19 06:22:05 2005
>Mailing-List: contact [EMAIL PROTECTED]; run by ezmlm
>...
>List-Id: <users.spamassassin.apache.org>
>Delivered-To: mailing list users@spamassassin.apache.org
>...
>
>At 10:44 PM 1/18/2005, List Mail User wrote:
>>         I don't know about digex, but dnsstuff.com is listed in SPEWS level 1
>>and level 2, completewhois.org and whois.rfc-ignnorant.org.  BTW. I personally
>>don't trust anyone with a disconnected telephone number, and they seem to
>>probe my own address space quite often (both DNS and SMTP testing), always
>>tracing back to a dial-up account or a proxy somewhere (with those irritating
>>"ad"'s saying "this is not abuse" - example from one of their "relay" tests:
>>
>>to=<[EMAIL PROTECTED]>.
>>
>>         At least that's what the email triggered on my SA report (and of
>>course spamhaus is on rfci's abuse list, like many anti-spam organizations
>>are on either the abuse and/or the postmaster lists - they can't afford to
>>devote a human to processing the mail-bombing that occurs, though I believe
>>ISPs can't justify the same excuse - they are run-for-profit concerns, and
>>that should be just one of the costs of doing business).
>
>I find that entire complaint amusing.
>
>So, you consider open relay tests mailbombs...
>
>Why are you accepting them in the first place?
>
>
        Not that I do or don't accept them, just an attempt to verify who
dnsstuff.com/dnsreports.com is, shows invalid whois data.  Since the last time
they hit me (and I believe the operator *may* be well meaning), he's gotten
listed in SPEWS, completewhois.org and I nominated him for rfci.  His machines
don't get through anymore, for those reasons (I'm loath to block at the IP
level, because you cannot "return" a reason why the connection is refused
- though sometimes it is the only recourse).  Also, during a few of his
"report generations", I was able to back trace the machine doing the dial-up
to "known" malicious users (e.g. The "reported" address requesting the test
had open ports and services identifying the host by a non-dial-up name and
checking the identified hosts by IP would show the same "fingerprint" for
services and the software version running them - and of course, the non-dial-up
address was in the SBL or SPEWS itself).  I just happen to distinguish between
someone like orbs testing or the Icann periodic ping testing and a commercial
service (with banner ads on his pages), who attempts to relay for whatever
reason.

        Simply, there are legitimate reasons for some people/organizations
to test my servers;  I just don't think he has any (unlike some services
either require the request to come from the domain itself or non-commercial
services who provide a community service) and when he tests, he both "bangs
hard" and misreports the data to the requester very often - basically the
service and the provider have no valid excuse, in my mind, for what they do.

        Also, regular parsing of the logs for relay attempts has provided me
with a list of `hunters' for further investigation *my* favorite is the set
of email addresses "[EMAIL PROTECTED]" (Sorry I enjoy the humor and forthright
attitude it shows), but the most prolific is "[EMAIL PROTECTED]; This morning
the second one was using "[EMAIL PROTECTED]", "[EMAIL PROTECTED]",
"[EMAIL PROTECTED]". and "[EMAIL PROTECTED]".  Maybe a few others out
there will check and see these in logs also.

        Paul Shupak

Reply via email to