Interesting new spam technique - getting a lot more popular.
Patrick W. Gilmore
patrick at ianai.net
Wed Jun 14 17:57:13 UTC 2006
On Jun 14, 2006, at 1:53 PM, Church, Chuck wrote:
> Since this technique requires a IPinIP or GRE tunnel, wouldn't
> blocking
> these two protocols to/from the hosts be sufficient? Assuming of
> course
> the customer's host isn't using that normally.
Unfortunately, that probably won't work for very long, if at all.
First, it's kinda difficult to guarantee your customers will not use
a protocol.
Second, unless you have deep packet inspection, what is to stop the
spammer from using, say, port 80 for their tunnel?
Third, what's to stop them from using SSH tunnels?
Etc., etc., etc....
--
TTFN,
patrick
More information about the NANOG
mailing list