Interesting new spam technique - getting a lot more popular.

Patrick W. Gilmore patrick at ianai.net
Wed Jun 14 17:57:13 UTC 2006


On Jun 14, 2006, at 1:53 PM, Church, Chuck wrote:

> Since this technique requires a IPinIP or GRE tunnel, wouldn't  
> blocking
> these two protocols to/from the hosts be sufficient?  Assuming of  
> course
> the customer's host isn't using that normally.

Unfortunately, that probably won't work for very long, if at all.

First, it's kinda difficult to guarantee your customers will not use  
a protocol.

Second, unless you have deep packet inspection, what is to stop the  
spammer from using, say, port 80 for their tunnel?

Third, what's to stop them from using SSH tunnels?

Etc., etc., etc....

-- 
TTFN,
patrick



More information about the NANOG mailing list