Comcast and SORBS
Robert L Krawitz
rlk at alum.mit.edu
Wed Nov 24 21:40:26 EST 2004
Date: Thu, 25 Nov 2004 10:52:42 +0900
From: Derek Martin <invalid at pizzashack.org>
On Wed, Nov 24, 2004 at 02:01:45PM -0500, Don Levey wrote:
> > Most of the computers on comcast's networks which send out spam are
> > compromised, working on the behalf of criminals. I'm sure there is a
> > solution here, but blocking EVERYBODY is the wrong one.
> >
> But you're NOT blocked - you can run your mailserver and smarthost through
> Comcast's server.
I /AM/ blocked. It's the Comcast server, which I don't want to
use, which isn't blocked.
That's your choice. You're not actually blocked from sending mail;
you just have to send it through a particular server.
> You can receive mail directly. You're not impeded at all, except
> in those things which have the potential for severe abuse and are
> also against the TOS.
Punish people who commit abuse, not those who could... Comcast has
access to the MAC addresses of its clients. They can provide
access control on that basis. They can block people who become
offenders. If they do this, there is no need for the rest of the
world to reject mail from their entire net block. There are other
workable solutions that don't punnish the innocent.
This "punish the innocent" is going too far. You aren't being
restricted in any significant way that I can see. Yes, Comcast can
log your email if it goes through their servers, but they could also
log outbound SMTP traffic very easily by capturing packets.
The rest of the world isn't going to stop filtering inbound SMTP by
netblock, and since you don't have a contract with other ISP's you
have no real cause for complaint -- they're entitled to accept traffic
from whomever they please.
Forcing SMTP traffic through their servers makes it easier for them to
stop spam before it hits the rest of the net, but doesn't (to my view)
really stop you from doing much of anything. I'd be much more
concerned about rules prohibiting ssh, ftp, http, etc. service (which
really do inhibit your ability to e. g. remotely log in from work or
make your content accessible to others).
> This is not *THE* real solution, but it is part of the solution.
> Or do you seriously think that abusing, say, 80% of the network
> is not worse than abusing 25%? The rest of the solution may
> include making sure that the remaining 25% becomes less
> spam-friendly.
In fact, it makes no difference. People who use spam-blocking
technologies will not deliver the spam, whether or not their ISP
blocks dynamic addresss. Technologies like spam assassin do a good
job of catching spam and getting rid of them. There are workable
solutions that don't punnish the innocent.
But this still forces the recipient (and the network as a whole) to
expend cycles and bandwidth to screen the spam. Blocking it at the
source reduces the load on the rest of the network.
Those should be
employed instead of net block blocking. At absolute most, the net
block should be used to increase the messages spam score -- NOT
block it outright.
Which means that someone sending email from a dynamic netblock has a
higher chance of having email lost due to its content than otherwise,
so I don't see how that's a very satisfactory solution.
--
Robert Krawitz <rlk at alum.mit.edu>
Tall Clubs International -- http://www.tall.org/ or 1-888-IM-TALL-2
Member of the League for Programming Freedom -- mail lpf at uunet.uu.net
Project lead for Gimp Print -- http://gimp-print.sourceforge.net
"Linux doesn't dictate how I work, I dictate how Linux works."
--Eric Crampton
More information about the Discuss
mailing list