North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: 209.68.1.140 (209.68.1.0 /24) blocked by bellsouth.net for SMTP

  • From: Suresh Ramasubramanian
  • Date: Sun Sep 25 22:23:53 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=IMAOGNtnKDn+ulv7B4ZOkbpmuJmPIsN8rFoOJLMw8sDY/LitUPi26tIkm7G+0kWqs3wtNiwzmTcMpZawbmTv90QMs6V2wrzaWaVOdU5KE1lXab/GX9QvO0hxU3/SStXWslAArDxV4OYU4a23FXMxgl8vHmjAONIg42LEi8GXJk0=

On 25/09/05, [email protected] <[email protected]> wrote:
> Yes, this is quite clearly the case; there are dozens of mutual customers
> who have forwarding rules setup.  We are not generating Spam to send to
> Bellsouth; it's coming from somewhere else and then being forwarded.

Kevin

When we face this situation with a site that has lots of forwarding
users pointing their accounts to mailbox on our service, what we
generally suggest is that you route email for forwarding users out
through a dedicated server, and let us know its a forwarder

So we dont count numbers from that IP in our filtering metrics, or at
least take into account that its a forwarder.  We also have feedback
loops setup so that if you get a loop from us you can stomp on either
spam origination (like a compromised script on a pair webserver) or
forwarded spam [whatever's leaking past your filters in large amounts
- you can catch that and block it at your end].  note:  If you know
its spam, if you detect it as spam (for example using spamassassin)
dont tag it and forward it on - 550 it, as a hard and fast rule.

[same case with aol i believe - not speaking for aol here]

I would suggest you do it that way - at least suggest this to bellsouth.

--srs ([email protected])

--
Suresh Ramasubramanian ([email protected])