On 8 Jun 2016, at 9:10, RW wrote:

On Wed, 8 Jun 2016 13:48:13 +0200
Reindl Harald wrote:

[...]
but that don't mean when my machine is hacked, sending snowshoe spam
and it *has* a dynamic IP that it don't get listed at
css.spamhaus.org for that reason

one hour later you or anybody else could end in get the very same IP

No, because they aren't addresses from dynamic pools.

The initial announcement of the CSS (https://www.spamhaus.org/news/article/646) was explicit about that: CSS lists statically assigned addresses. CSS lists single addresses because it is not always clear where the boundaries of a snowshoe range are and in some cases snowshoers have scattered their systems amongst legitimate mail systems, apparently with ISP or hosting reseller complicity.

There also seems to be some misunderstanding about what constitutes "snowshoe spam". To the best of my knowledge, Steve Linford of Spamhaus coined the term (circa 2003) so the Spamhaus explanations of it get seniority. One from before the CSS existed is at https://www.spamhaus.org/news/article/641

Important from that article is this distinction:

Where botnet spammers hide behind illegally obtained Trojan horse proxies, snowshoers pay ISPs for many diverse IP ranges for their spam spigots.

Snowshoe spam isn't defined by its content, although the snowshoe strategy is a good fit for spam that is plausibly legitimate: a cut above what comes out of botnets. Snowshoers tend not to do phishing and malware distribution, but rather mostly send what can be called "superficially CAN-SPAM-compliant spam" in reference to the very loose US federal law regulating spam. Snowshoe spam has been responsible for beclowning some true believers in anti-spam magic bullets (e.g. SPF) because snowshoers spend real money and make a real effort to evade easy filtering and seem to recipients like it might be somewhat legitimate. A compromised machine on a dynamically-assigned address might be a conduit for superficially similar spam with similar content but that does not make it "snowshoe spam." Snowshoe is a technical strategy, not a flavor of spam.

The main Spamhaus CSS description page *is* a bit vague and I suspect that's partly to avoid telling snowshoers how to avoid CSS detection and partly because CSS is not perfectly 100% snowshoe spammers. CSS does automated detection using a composite of criteria that are designed to identify snowshoers and it catches a small number of chronically abused insecure web servers as a side effect because they share some characteristics, such as being on static IPs in cheap sloppy hosting networks. It is also helpful to understand the nuance of "compromised host" in the CSS description. The word "host" implies a machine that isn't a personal computer, is rarely shut down or rebooted, isn't getting a different address from DHCP every time it boots, and has symmetric A and PTR records in DNS that are not derived from its IP.

Reply via email to