nanog mailing list archives

Re: [BULK] Re: SORBS contact


From: Michelle Sullivan <matthew () sorbs net>
Date: Sun, 31 Jul 2011 05:20:34 +0200

Jimmy Hess wrote:
On Sat, Jul 30, 2011 at 7:57 AM, Michelle Sullivan <matthew () sorbs net
<mailto:matthew () sorbs net>> wrote:

    Rich Kulawiec wrote:
    > On Sat, Jul 30, 2011 at 01:45:52AM -0400, Dan Collins wrote:
      [snip]

    later in the document,  Webmaster@ is not in the required list.
     As per
    my previous email, the webservers (all of them) report another email

    [snip]


I wouldn't fault SORBS for not supporting  optional addresses such as
webmaster@.
I would  fault SORBS for   automatically listing someone e-mailing
webmaster@ though,
as implied above.     Whether the actual RFC existed or not.

It's probably true that all the standard addresses are likely to be
subject to abuse.   info@  sure is.

However,   they should not be listed without at least analyzing the
content of the actual message.
To decide if it is in fact abuse,  OR  if it's just a human failure,  
somebody attempting to contact
an admin address/service  that does not exist.

There mere act of attempting to contact multiple standard addresses
alone, is certainly
not proof of abuse.

A valid and well put argument.  I don't know what we do with stuff to
webmaster@ however I do know that it is possible that messages to it
will go into the spamtrap system. (the spamtrap system has multiple
entry points, and a mail going in does not guarentee a listing, but it
is likely, especially if the message is repeated to multiple addresses
and therefore is 'bulk'.)

Michelle

-- 
Vulnerabilities are weaknesses associated with an organisations assets that maybe exploited by a threat causing 
unwanted incidents.
http://www.mhix.org/



Current thread: