From owner-freebsd-current Fri May 23 13:58:47 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id NAA15352 for current-outgoing; Fri, 23 May 1997 13:58:47 -0700 (PDT) Received: from mercury.uniserve.com (mercury.uniserve.com [204.191.197.248]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id NAA15344; Fri, 23 May 1997 13:58:44 -0700 (PDT) Received: from haven.uniserve.com (shell.uniserve.com [198.53.215.121]) by mercury.uniserve.com with SMTP id NAA20923; Fri, 23 May 1997 13:56:40 -0700 (PDT) Date: Fri, 23 May 1997 14:01:50 -0700 (PDT) From: Tom Samplonius To: Jonathan Lemon cc: Terry Lambert , "Duane H. Hesser" , cat@uunet.ca, current@hub.freebsd.org, jmb@hub.freebsd.org Subject: Re: UU.NET, SPAM, and Cyberpromotions (was Re: usregsite.com) In-Reply-To: <19970523141845.49335@right.PCS> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-current@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Fri, 23 May 1997, Jonathan Lemon wrote: > Heh. Don't send mail to 'abuse@cyberpromo.com'. It is actually an > alias for 'add-me-to-your-mailing-lists@cyberpromo.com'. You can try > complaining to their upstream provider (AGIS) but they aren't too > helpful either. AGIS is supposed to be implementing a 'remove-list', > but it just happens to be run by the same people who operate quantcom.com, > which is also a known spam domain. Complaints to AGIS will be ignored, or you will get a form response defending Cyberpromo as legit a internet business (I've seen one of these). If you complain futher about additional incidents, expect your e-mail to abuse@agis.net to blocked. The top 5 spam services all use AGIS for connectivity (according to a press release from Quantcom). I have confirmed that Cyberpromo, Quantcom, and Sallynet/Nancynet all use AGIS. I think it is about time, that a boycot against AGIS was started. It is quite easy to block all of AGIS's netblocks. Also, Quantcom uses FreeBSD 2.1.something on their primary spam exploder, glenn.quantcom.com. To verify, telnet to glenn.quantcom.com. Expect the telnet port to closed off soon, as other people try to identify this machine. Tom