Date: Thu, 01 May 1997 23:54:01 -0500 From: "Jeffrey J. Mountin" <sysop@mixcom.com> To: Tom Samplonius <tom@sdf.com> Cc: FreeBSD-Hackers@FreeBSD.ORG Subject: Re: SPAM target Message-ID: <3.0.32.19970501235400.00b0cc24@mixcom.com>
next in thread | raw e-mail | index | archive | help
At 06:41 PM 5/1/97 -0700, Tom Samplonius wrote: > >On Thu, 1 May 1997, Josef Grosch wrote: > >... >> I'm going to sent this bozo a note telling him not to spam our lists. A Cc >> to agis.net may help > > Not likely. AGIS is the current home of Cyber Promotions, and actively >defends their activities. Yep and is the reason why they suffered a serious denial of service attack 2 weeks ago and I'd guess the same thing happened on Monday, but didn't see any news. Apr 30 05:49:59 mixcom smap[9389]: refused - blocked site: <<asociation@cyberpromo.com> 8-) The only bad thing about our modified smap is the server that is exploited as a relay suffers the bounce, but if they allow relay... TFB. Yet I do let them know they are being exploited as a spam relay. And for direct a little addition to the Cisco: <bigger>acce 100 deny tcp 205.199.2.0 0.0.0.255 any eq 25 acce 100 deny tcp 205.199.212.0 0.0.0.255 any eq 25 </bigger> Another feature being tested is if the nameserver(s) is a server that we consider a spammer. They don't usually use their servers. A few days back CP probed our secondary MX with some messages, but they didn't get very far. Bwahahahaha! Tired of f'ing bounce messages due to invalid whatever. Sure wish everyone didn't allow relay. <<sigh> ------------------------------------------- Jeff Mountin - System/Network Administrator jeff@mixcom.net MIX Communications Serving the Internet since 1990
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.32.19970501235400.00b0cc24>