Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Spam The Internet Your Rights Online

Swedish ISP Blocks Computers That Send Spam 265

snuppepuppan writes "One of Sweden's largest ISPs, Telia starts to block computers that send spam. 'The computers that Telia will block are primarily those that have been infected with "trojans" which are being used, without the customer's knowledge, to send enormous amounts of spam.'"
This discussion has been archived. No new comments can be posted.

Swedish ISP Blocks Computers That Send Spam

Comments Filter:
  • a great idea (Score:5, Interesting)

    by batray ( 257663 ) on Tuesday November 04, 2003 @03:08AM (#7384635)
    If more ISPs took spam complaints seriously and acted on them quickly the net would be a better place. However it is has been my experience that abuse desks are mostly staffed by the clueless.
    For me the dominant source of spam that I get now comes from infected computers, since DNSBLs have rendered fixed spaming IPs impotent.
    • Re:a great idea (Score:4, Insightful)

      by BrokenHalo ( 565198 ) on Tuesday November 04, 2003 @03:24AM (#7384694)
      abuse desks are mostly staffed by the clueless.

      That's where they are staffed at all. There are all too many ISPs who appear to be happy to turn a blind eye to this type of activity, in spite of the fact that it costs them money.

      • Re:a great idea (Score:2, Insightful)

        by ClosedGL ( 661482 )
        I think there is a lack of skills. Many ISPs employ call centre staff that have crib sheets infront of them and if the problem isn't outlined on the sheet, then it ain't getting solved.
        • I used to work at a computer helpdesk dealing with customers (I'm thankfully working at a better one now), and we had no incentive to fix problems. We were pressured to get a certain number of calls dealt with - so if we fobbed off a customer with crap, we'd look good. If on the other hand we genuinely tried to fix a problem, seeing it through to the end, we'd get a happier customer, but moaned at by management. The problem is not just cluelesness - I often had the tech knowhow to fix problems - but that it
      • Re:a great idea (Score:5, Insightful)

        by Keith_Beef ( 166050 ) on Tuesday November 04, 2003 @07:36AM (#7385275)
        There are all too many ISPs who appear to be happy to turn a blind eye to this type of activity, in spite of the fact that it costs them money.
        Well, in France, many ISPs have premium rate phone numbers for the helpdesk. So, if you're on a dial-up connection, the ISP makes money hand-over-fist! First, you pay to download the spam (because the ISP doesn't block it). Then you pay for the pleasure of listening to 10 minutes of vivaldi's Four Seasons, before explaining to helpdesker No.1, who then passes you on to helpdesker No.2, who wants all the same details again... you get the picture. Finally, if you manage to get any help at all, you'll be sent an e-mail with a 650KByte MS Word attachment, with details of how to set up spam filtering *on your home computer*, so as to filter out spam *after you've downloaded it* Stupid, those ISPs? No, they have a profitable, if immoral, business model. Keith.
      • Whaddya talkin about? This Dave Null guy seems to be employed by thousands of ISPs to handle abuse@. He must be really good at his job...

    • Re:a great idea (Score:4, Insightful)

      by Zocalo ( 252965 ) on Tuesday November 04, 2003 @06:04AM (#7385026) Homepage
      abuse desks are mostly staffed by the clueless

      Depends on the ISP. Generally speaking mid-sized ISPs have pretty good abuse desks, mainly because they are big enough to have a decent technical team, yet small enough to not be swamped by abuse reports. That said, this kind of thing is a no brainer for the scripted response type of first line support used by large ISPs. Basically it boils down to "look for an IP in the mail headers that falls within a set of provided IPs and if present, click some widget to block outbound email from that IP". All you need then is some process to advise the customer of the problem and remove the block once the problem is resolved.

      As you say, DNSBLs (non-dynamic ones anyway) have been rendered largely obsolete by the spamnets of compromised machines. There are so many of the damn things that a spammer can use an IP for a couple of days, discard it and not need to use it again for a couple of months, by which time it is probably off the DNSBLs again. This approach adopted by Telia (and Demon Internet in the UK, others?) is the only efficient way a large ISP can deal with this issue without incurring massive labour costs that I can think of.

    • Re:a great idea (Score:5, Informative)

      by gizmonic ( 302697 ) * on Tuesday November 04, 2003 @09:14AM (#7385530) Homepage
      My guess is that part of the problem is that most abuse desks are flooded with inane crap. At least ours is. I can't tell you how many emails we get from people who forward a spam to us, and do not include full headers. I mean, they had to find the IP and track down who owned it to get the spam report to us, so how can they then forward us the spam and not include headers? Amazingly, that accounts for well over half the abuse mail we get. Then there are the people who send a message saying "Stop sending me spam" and include an IP address, followed by a copy of our ARIN netblocks, as if we didn't know who we were, and that's it. No spam, no timestamp. Nothing. Then there are the myriad of people who simply write our abuse desk with nothing more than "Please remove me from your mailing list." And it goes on and on and on like that. Of course, now that all the nice new viruses are out there, we also get a ton of "One of your users attacked me on port 135" emails. (We have port 135 blocked on our routers to keep from our users from infecting the net, but on the same NAS, they can still get to each other.) The best ones are from people who send us email claiming they are being attacked by one of our DNS servers because their firewalls are capturing logs of the DNS requests.

      That's why, as I've said before, we love SpamCop. When we see a SpamCop report, we know we will have everything we need to knock someone off the network. Very seldomly have we gotten a SpamCop report on something that was not spam. As for the rest of the abuse mail? Maybe 1% or 2% have enough information to track the user, and are actual abuse issues. And usually, they were already banned from a SpamCop report.

      Anyway, I've rambled on enough. But for those who don't work abuse for a large ISP, now you have a small glimpse of what the abuse mail looks like.
  • by bobdotorg ( 598873 ) on Tuesday November 04, 2003 @03:09AM (#7384636)
    In a related story, Microsoft sues Telia, commenting, "C'mon, it would only be a matter of time before all Outlook and IE users get banned from the net."
    • Funny thing is that in Sweden, Telia is for ISPs, what Microsoft is for desktop operating systems in general. Abusing monopolistic power is run of the mill business practice for Telia and has been like that for the last 20 years.

      Microsoft vs Telia would be a case in which I'd very much like to see both parties loose. :)
  • Good. (Score:4, Insightful)

    by clfrd ( 545421 ) <jsearles&satx,rr,com> on Tuesday November 04, 2003 @03:10AM (#7384642) Journal

    More ISP's should do the same.

    Period.

    • Re:Good. (Score:3, Informative)

      Telia is now "TeliaSonera", after merging with the Finnish company Sonera. This anti-spam move is not just in Sweden, it's in Finland too.

      ISPs must provide a QOS in Finland, and Sonera were fined recently (last few weeks) for being unable to deliver mail as they were so bogged down with spam.

      So they're not doing it for altruistic reasons, they're doing it because it costs them big-time if they don't. I'm still glad they're doing it though.

      All of this was filtered from stories in the Helsingin Sanomat
      via
    • Monitoring email volume is good. I'd like it if my ISP monitored activity and shut down machines that started blowing spam out. This simply makes people responsible for their computers.

      The way my ISP, Cox, tried to do things is bad. They forced all trafic through their SMTP server. They had already blocked incoming mail, so you could not run a mail server on your own. The new policy keeps you from even being able to send you own mail. This sucks in many ways. The most important way it sucks is that

  • by the man with the pla ( 710711 ) on Tuesday November 04, 2003 @03:10AM (#7384646)
    ISP's taking some level of responsibility for the actions of their subscribers is *tremendously* important. Spam exists because of the complacency of two entities: ISPs that allow (or even sell bandwidth to) spammers to use their networks; and Microsoft, for making it so easy for computers to be enslaved by spammers (sorry I know that's flaimbait, but it's true.)
    • by it0 ( 567968 )
      Yes but it has implications, if they take action against spam, they must take action against kiddie porn, warez etc. That's still fine, however I can imagine that there are gray area's where ISP's going to screw up.
      • by 87C751 ( 205250 ) <sdot AT rant-central DOT com> on Tuesday November 04, 2003 @07:29AM (#7385256) Homepage
        if they take action against spam, they must take action against kiddie porn, warez etc.
        Not necessarily. My ISP (Fuze) recently started blocking outbound port 25 connections unless directed to their SMTP server. Shortly after that, I heated up an older box I have, which used to be the house mailserver. Of course, there was some traffic stuck in its mail queue, which it tried to send. Fuze suspended my service (reported with a web page shown when I tried to go out on the web) until I called the helpdesk. They did this purely based on the appearance of the traffic, and not on the content.

        The conversation with the helpdesk guy was kinda amusing, though.

        HDG: "Are you familiar with a program called Zone Alarm?"

        Me: "Sure. Are you familiar with the SMC Barricade router?"

  • Why is this news? (Score:5, Interesting)

    by eddy ( 18759 ) on Tuesday November 04, 2003 @03:11AM (#7384647) Homepage Journal

    Telia is mostly known for their suckage over here. They've made several false starts, including blocking SMTP completely at their border making it impossible to host ones own mail server.

    I guess if they've finally given up on that idoicy and actually go after the specific hosts that are a problem -- like we in the community has said for years is the correct solution -- then I'm all for it.

    Just sad that it's making news the way it is. I think the news should be that they wasted at least two years reaching this "insight"!

    Would be interesting to know if this was because the suits finally listened to their techs, or if it's because the techs finally gained a clue.

    • by Drakin ( 415182 )
      It's news because it's an ISP actually doing something useful and proper in dealing with this sort of thing.

      It's unbeleiveably rare.
    • Re:Why is this news? (Score:4, Informative)

      by Anime_Fan ( 636798 ) <slashdot@sjoelu[ ]net ['nd.' in gap]> on Tuesday November 04, 2003 @03:55AM (#7384772) Homepage
      Telia is mostly known for their suckage over here. They've made several false starts, including blocking SMTP completely at their border making it impossible to host ones own mail server.

      Yes, but bostream is no better. They make customers who want to use an email with FROM-header other than foo@*.bostream.foo setup their own SMTP-server. I preferred Telia's approach.

      I don't think their press release will affect the ammount of spam in my inbox. Telia is all too clueless for that. I am however happy that I get a pretty low ammount of spam when compared to US figures. I'm down to less than one junk mail per hour and still not prepared to pipe all messages through SpamAssassin (too high false negatives due to most mail being sent in Swedish).

      Still, Telia has alot to do with the ammount of incoming spam. Most of the spam that arrive in my Telia inbox doesn't even have my email in the TO-header (but has it in X-Original-To). The other types of spam I get is the ones that look like:
      Received: [*Snip*] Sat, 1 Nov 2003 15:50:49 +0100 (CET)
      Date: Wed, 28 May 2003 23:14:06 +0000
      I hate spam I can't directly see which box it is sent to, which date it was sent or that has ASCII-art topics.
      • Re:Why is this news? (Score:3, Informative)

        by Troed ( 102527 )
        I'm down to less than one junk mail per hour and still not prepared to pipe all messages through SpamAssassin (too high false negatives due to most mail being sent in Swedish).

        I've never had a mail in Swedish marked spam by SpamAssassin - the only false positives I've had (three in 6 months) were mails from mailing lists where the poster indeed had weird headers.
    • blocking SMTP completely

      That might just have been because AOL began bouncing all e-mail from Telia -- mainly due to the same problem as they have now. What would you have done?

      I think this is a good thing. it stops the relays now and those affected will notice it, call the support, and be informed of why they were cut off.

    • Re:Why is this news? (Score:2, Informative)

      by gizmonic ( 302697 ) *
      Blocking SMTP is not idiocy. You might be inconvenienced a bit, but spammers still use throwaway accounts. They pay their first month of service, and then spam until the ISP finally catches on and shuts down the account. If it takes even 8 hours to catch them, that's millions of spams. Most of our spam reports are around 24 hours old when they reach us. That's 24 hours of constant spamming. Port 25 blocks keep them from being able to use our network to do that.

      It may be a bit upsetting not to be able
  • by quizwedge ( 324481 ) on Tuesday November 04, 2003 @03:11AM (#7384648)
    We have a local ISP and we are probably his largest customer. We've had problems since he is a startup and he traced them to trojans/worms/etc. so he sent them a warning to fix their system and then when they didn't, he shut them off. It's worked very well for us, keeps the number of infections down, keeps his network up and running, and keeps people accountable for the security of their computers.

    And if anyone is wondering why we're going with a startup for business, it's because the only choice between 144kbps DSL and a full T1 is this guy.
    • by NorwBlue ( 711956 ) on Tuesday November 04, 2003 @05:12AM (#7384933)
      Actually, I did not wonder why You went with a startup for business. I Used to be Head of Computing in a company that spend around 2 mill $ and when we dropped the biggest computer supplier in Norway for a small startup, guess what : We went from being a ok account in a huge company to being the biggest account in a small company (It more than trippeled its sales). We suddenly got really good service, better prices and every one we called for help/support/service bent backwards for us(when we wanted them to, wich wasn't that often*evil grin of power*) So my advice to everyone managing a net is : don't follow the big fish, but find a place where You ARE the biggest fish. A bit off topic maybe, but if everyone did the same when it came to ISP services, YOU to would have leverage if you wanted your ISP to implement something similar.
  • by Jugalator ( 259273 ) on Tuesday November 04, 2003 @03:12AM (#7384652) Journal
    The users blocked are notified about it, and Telia will help them sort things out. Probably by giving suggestions to clean up trojans, etc. since these are often the reason someone spam without knowing. They also only seem to block well-known, heavy duty, spammers right now, since they haven't yet implemented a spam filter, but are considering it.

    So, even if the customers won't be given a time period to stop spamming, they're still not left unaware about it, as the /. news post incorrectly states.

    Telia says they're also attempting to detect spam hosts much quicker than earlier, when it could take up to a week or more to shut a host on their network down, when the damage was already done.
  • It makes perfect sense to block off the trojan infected PCs that are sending SPAM. But I don't believe it is fair not to notify the user of said infected PC. Some of these people may have friends who have Telia email accounts, and if they're being blocked, it means they can't receive mail from them. So, while I agree with Telia's decision, they should give the courtous of notifying the individuals first.
    • by jaavaaguru ( 261551 ) on Tuesday November 04, 2003 @05:54AM (#7385005) Homepage
      I see nothing wrong with the customer's connection being immediately withdrawn. When they find out they either can't connect to the 'net, or just can't send e-mail, they'll call technical suport anyway, and then the ISP can easily inform them of the problem.

      Also, people shouldn't choose to use technology that they don't have a good understanding of unless it's been set up properly by someone else beforehand. By that, I'm not meaning that the average member of the public shouldn't surf the Internet with their PC - one of these things should be happening:

      1. They use a computer system that's been set up securely by the vendor

      2. They apply all the latest security patches as soon as they're released

      3. They understand about computer security and secure their system themselves.

      If you own a computer connected to the Internet, then it's up to you to decide what you do with it, and what you let other people do with it.
      • If you own a computer connected to the Internet, then it's up to you to decide what you do with it, and what you let other people do with it.
        Oh, I wish that were true. Unfortunately, your ISP decides what you can do on the internet. Some ISPs are much better than others, but most impose some restrictions.
    • I disagree.
      It is not nice to be cut off without warning, but if your machine is infected or comprimised in some way then it needs to be isolated.

      True, an email warning would be helpfull, but some people only read their email once a week or less. In the mean time their machine could still be on, and relaying junk all over the place.

      Best cut them off and have them contact Customer Services to be reconnected. Ok they probably might want to join another company afterwards...

      Or send them an physical letter.

      T
  • by Gubbe ( 705219 ) on Tuesday November 04, 2003 @03:21AM (#7384681)
    TeliaSonera is a company formed by the merger of swedish Telia and finnish Sonera. Sonera is one of the largest Internet/telecommunications providers in Finland and their e-mail systems have become a laughingstock during the last month. Reason: they don't work. There have been delays of several days in message delivery, some messages are lost entirely and their SMTP server seems to be down.
    Sonera is blaming this 100% on the W32.Swen.A virus and while there is ongoing debate regarding Sonera's e-mail administrators' competency, that certainly explains why Telia is scrambling to remedy this problem in Sweden. [Un]fortunately (ignore the part in brackets if you are a privacy advocate) the Finnish legislation doesn't allow Sonera to perform the same thing as even automatic monitoring of e-mail traffic is not permitted by the communication privacy laws.
    • Sonera is one of the largest Internet/telecommunications providers in Finland and their e-mail systems have become a laughingstock during the last month. Reason: they don't work. There have been delays of several days in message delivery, some messages are lost entirely and their SMTP server seems to be down. Sonera is blaming this 100% on the W32.Swen.A virus and while there is ongoing debate regarding Sonera's e-mail administrators' competency, that certainly explains why Telia is scrambling to remedy th
    • [Un]fortunately (ignore the part in brackets if you are a privacy advocate) the Finnish legislation doesn't allow Sonera to perform the same thing as even automatic monitoring of e-mail traffic is not permitted by the communication privacy laws.

      Actually, Sonera got a special permit from the Finnish communications bureau last week for scanning all emails for virii and trojans. What I wonder is, if they can't config their mail servers, can they config the scanning properly?

      Another matter is that I nev

    • I'll buy that... (Score:3, Insightful)

      by Nijika ( 525558 )
      Seriously, for e-mail administrators it's been like one new variant a week since about oh I dunno, JULY. Most ISPs these days can handle the amount of UCE that's sent through thier systems, but some just barely. Tack on these viruses and you can easily see your e-mail jump four fold. Add to that queueing of messages that are "undeliverable" and your systems, no matter how big, start to falter.

      In these instances filters like SpamAssasin may even add to the problem since they often consume more overhead

  • Good. (Score:3, Interesting)

    by Sheetrock ( 152993 ) on Tuesday November 04, 2003 @03:22AM (#7384682) Homepage Journal
    Oftentimes, users don't even realize they've got trojans until there's some form of penalty. Internet access suddenly stopping, warning messages, a big red Alert, or something.

    It used to be one knew they had a virus because an ambulance would fly around the screen or the computer would stop working. But given the amount of these things coming in through P2P I'm not surprised they aren't seeing all of the extra traffic on the little set of computers in the system tray.

    Hopefully, the ISP will be similarly proactive in restoring access when the traffic stops. I'd hate to think somebody's dynamic IP address stops working ala Something Awful because of somebody else's bad Net habit.

    • Re:Good. (Score:2, Informative)

      by krymsin01 ( 700838 )
      It'd be a lot easier that block a user's dynamic IP. Simply suspend their account. Then you don't have to loss an IP from your pool.
    • Re:Good. (Score:3, Interesting)

      by Per Wigren ( 5315 )
      One way for an ISP to inform clueless users before shutting them down is to SNAT all outgoing port 80 connections to an informationpage saying something like "Your computer is infected by a virus and is causing problems for the rest of the network. Click here to install an antivirus program!"
      A bit extreme maybe but still better than just shutting the thing down..
  • Good news! (Score:3, Interesting)

    by RT Alec ( 608475 ) * <alecNO@SPAMslashdot.chuckle.com> on Tuesday November 04, 2003 @03:22AM (#7384687) Homepage Journal

    This is certainly good news. Now their customers who are infected will figure things out pretty quickly!

    Of course, this would have been easier if they just blocked egress port 25 traffic (which would not include their own SMTP server, of course!). Imagine all ISPs blocking egress port 25 traffic for their DHCP clients (e.g. most cable modem, dial-up, and DSL), and shutting off their corporate clients who spew spam! That would effectively eliminate spam, since IP addresses left still sending spam (directly or due to a trojan/virus) would quickly end up on DNSBLs.

    It is irresponsible for ISPs to operate otherwise. Simple steps to be a good netizen:

    • Don't use port 25 for initial mail submission. The fact that this port is used for both mail transport (between systems) and initial mail submission (which is really a different activity if you think about it) is a mistake. Use port 587 with SMTP+AUTH, or port 465 with SMTP+AUTH+SSL
    • Implement one of the reverse lookups for incoming SMTP traffic (RMX [mikerubel.org] or SPF:Sender [slashdot.org]) when one of the competing proposals become a standard (and your software catches up)
    • Block egress port 25 traffic from your network
    These apply to any businesses that supplies IP connectivity to any other computers (offices, schools, WISPs, in addition to standard ISPs). To not do so is to be a part of the problem.
    • Re:Good news! (Score:3, Insightful)


      Of course, this would have been easier if they just blocked egress port 25 traffic (which would not include their own SMTP server, of course!). Imagine all ISPs blocking egress port 25 traffic for their DHCP clients (e.g. most cable modem, dial-up, and DSL), and shutting off their corporate clients who spew spam! That would effectively eliminate spam, since IP addresses left still sending spam (directly or due to a trojan/virus) would quickly end up on DNSBLs.

      Eliminate spam? Spare me.
      Currently, less t

      • Currently, less than 85% of spam comes from trojaned DHCP clients.

        So, by your own numbers, shutting down direct-to-MX email from DHCP clients should eliminate about 85% of spam - that is a worthy target.

        I say 85% because if you had real figures showing a percentage less than 85% you would have used the lower number to make your point.

    • Re:Good news! (Score:5, Insightful)

      by piranha(jpl) ( 229201 ) on Tuesday November 04, 2003 @03:56AM (#7384779) Homepage
      Imagine all ISPs blocking egress port 25 traffic for their DHCP clients ... It is irresponsible for ISPs to operate otherwise

      Then they cease to be Internet Service Providers and become Interweb Service Providers. Why should "consumers" be subject to inferior Internet service? Why wouldn't/couldn't an ISP monitor egress port 25 traffic for suspicious spikes? I won't be doing business with ISPs that try pulling stunts like that.

    • Re:Good news! (Score:4, Insightful)

      by dmeranda ( 120061 ) on Tuesday November 04, 2003 @04:55AM (#7384902) Homepage

      Blocking entire ports is like using like using a sledge hammer to affix a staple. First the majority of spam email wouldn't be affected. And if you're delivering mail via some other protocol spammers will still get through. Port blocking is not really a good policy, except on an individual basis where there is proof of such activity; or in cases where the client is paying for an intentionally crippled partial Internet access.

      There is nothing wrong with using port 25. And if you want to use TLS/SSL, you should still use port 25 via the well established STARTTLS extension to the SMTP protocol. There is no reason to waste additional port numbers on experimental protocols when the SMTP protocol already does all that and is fairly mature with lots of supported software.

      Oh, and I for one rely on having egress port-25 traffic from my home DSL. I am not a spammer, but I am a network administrator of a large company and find it very useful to "test" my own servers from an external unrelated addresses.

      • There is something wrong with using port 25 for initial mail submission. Submitting a mail message by an end user is a different activity then two SMTP servers transmitting mail to each other.

        Initial mail submission is a potential security violation, and certain restraints on relaying mail are important. Here is where SSL and SMTP+AUTH make sense. The user submits the mail, and then can forget about it-- the SMTP server will now handle the rest, including queuing the message in case the remote MX host is d

        • So if an ISP were truely responsible then they should be blocking port 80 too, huh? Think of all the abuse that goes over port 80!

          Yes, I will grant that mail transport and mail submission are two separate tasks. That is why sendmail for instance isolates each activity with separate processes and even security barriers (user/group permissions, etc.). But just because it's two tasks doesn't mean my own computer is incapable of doing both or that I must be forced to allow my ISP to handle one half of it (

    • Don't be stupid.
      There are plenty of DSL and Wireless providers that allow you to run servers. I maintain about 30 such servers for small businesses. this policy would completely eliminate the ability of these businesses to economically run their own email/web servers. None of these servers send spam, they are not open relays, they are well maintained servers that deserve to be on the net, blocking them would be draconian and stupid.
      • I have many clients on DSL lines, too. They have arrainged with their ISP for a static IP address, and the ISP pretty much lets them do whatever they want to. Any malicious activity, and they know where to find them.

  • Background (Score:4, Interesting)

    by upside ( 574799 ) on Tuesday November 04, 2003 @03:28AM (#7384701) Journal
    The Finnish side of Telia, TeliaSonera, has been in deep sh*t the last few weeks. Their email has been clogged up, apparently at least partly due to the fact that they have been listed in a few blacklists. Even the comms authority has intervened and told them to put their act together.

    Trojanised PCs on broadband are the likely cause, and the block is most probably a measure designed to prevent such from happening again.
    • Re:Background (Score:2, Informative)

      by BOFHelsinki ( 709551 )
      You mean "Sonera, the Finnish side of TeliaSonera". ("Telia" is not a company any more, just a brand for the Swedish side of TeliaSonera. Not that Telia didn't somewhat get the upper hand in the merger...)
  • Workable Solution??? (Score:3, Interesting)

    by tintruder ( 578375 ) on Tuesday November 04, 2003 @03:30AM (#7384710)
    Instead of shutting them off, how about redirecting all internet activity of the victim/perpetrator to a static web page they must repeatedly click to bypass?

    For most users this would be adequate notification and encouragement to fix the problem.

  • This seems like a good (and almost obvious) solution. Forget blocking a Hotmail account, block the entire computer from getting net access in the first place. I like it.
  • by Anonymous Coward on Tuesday November 04, 2003 @03:35AM (#7384725)
    of traffic can easily be used to find and stop spammers. I am amazed that all ISP are not doing this.
  • by Anonymous Coward on Tuesday November 04, 2003 @03:43AM (#7384743)
    How is this news? My local ISP has been doing this for years. It's called "enforcing terms of service" on offending accounts.
  • Finland Too (Score:2, Interesting)

    by BOFHelsinki ( 709551 )
    FWIW, this is soon likely to take place with Sonera, Finland's biggest ISP, as well.

    Swedish Telia and Finnish Sonera (both stemming from the old national telephone companies, thus big players) merged into TeliaSonera last year, but still appear under the original names in the respective countries. Certainly they have a single policy on this.

    And Sonera especially has lately had serious, even nation-wide trouble delivering emails, due to worms flooding the system. Actually I wonder why it was Telia th
  • Thank Heavens!! (Score:2, Interesting)

    by mharris007 ( 142886 )
    At least major ISPs are recognizing that trojans and spammers are a major issue. I wish more ISPs would maintain a blacklist of trojaned and spamming computers, that takes some of the hassle up farther upstream, so it isn't wasting my bandwidth when I recieve a crap load of spam, or trojan attacks (Code Red comes to mind).

    This is a heaven sent, and more ISPs should follow suit.
  • WHY? (Score:4, Funny)

    by sinserve ( 455889 ) on Tuesday November 04, 2003 @04:05AM (#7384796)
    Shouldn't this be "YRO" instead of "Spam"? One man's spammer is another's Information Minister.

    • Maybe that's the real reason we went to war... It wasn't Weapons of Mass Destruction, it was Weapons of Mail Distribution.

  • by Anonymous Coward
    When I worked for DTV BB DSL we'd cut off the access of our customers that were spamming/had trojans or were mass scanning the network. We'd send a email to thier contact address to let them know. (I'm not sure how we expected them to check.) Usually they'd call us to ask why thier service was off and then get transfered to abuse.

    On the otherhand, we also double charged customers, charged $10/mo. extra to turn on NAT in our routers and on occasion continued to bill for months after they canceled (I saw a
  • Censorship. (Score:3, Interesting)

    by Anonymous Coward on Tuesday November 04, 2003 @04:16AM (#7384821)
    I'm against spam, but I'm more against ISPs deciding what I can do with the service I pay for. If they decide spam is bad, how long before they decide mp3s or porn should be on the "get blocked" list? Or perhaps they'll decide to block access to certain sites like pro-NRA ones? Oh wait, Symantec has already got that covered.

    Just make spam illegal and arrest the fuckers. No need to quash user rights in the process. Of course, I'm American so I have no idea what kind of freedom of speech rights you have in Sweden. Maybe you're already used to this kind of thing.
    • Re:Censorship. (Score:2, Informative)

      by ioErr ( 691174 )
      Telia's terms of use state that the customer may not use their service to send spam, and that he will have his connection terminated if he does. If someone wishes to send spam then he'll just have to find an ISP that is willing to sell him that service.
    • Re:Censorship. (Score:2, Interesting)

      by mst ( 30456 )
      If they decide spam is bad, how long before they decide mp3s or porn should be on the "get blocked" list?

      Many ISP:s already will block you if you try to share mp3:s etc and they get prodded by your "favourite" record association. And since that type of behavior is already taking place - desirable or not - I personally am almost happy to see one ISP now doing something more constructive with their surveillance as well by trying to stop spam, which really is bad.

      But then again, I live in Sweden ;)
  • Sweden? (Score:3, Funny)

    by LadyLucky ( 546115 ) on Tuesday November 04, 2003 @04:21AM (#7384830) Homepage
    Why not try a holiday in Sweden this year?
  • trojans... (Score:3, Insightful)

    by jlemmerer ( 242376 ) <xcom123.yahoo@com> on Tuesday November 04, 2003 @04:37AM (#7384863) Homepage
    there might be a little problem with the immediate cutting of the line: how do i get rid of the trojan without internet connection (e.g. to download a path or tool form symantec). it would be better to leave at least one port open for these reasons, and if the computer is clean again the customer can call the isp to be fully able to access the net again.
  • Leper VLAN (Score:5, Interesting)

    by Detritus ( 11846 ) on Tuesday November 04, 2003 @04:38AM (#7384867) Homepage
    Some Universities have an interesting way of solving the problem. Infected systems are switched to a VLAN that restricts them to accessing a web site that contains information, software and patches on how to clean up their computer.
  • If I ran an ISP... (Score:4, Interesting)

    by Alioth ( 221270 ) <no@spam> on Tuesday November 04, 2003 @05:51AM (#7384996) Journal
    If I ran a broadband ISP:

    1. All users would get a static IP (since there's an expectation that they are always on, there's no point in NOT doing so. In the dialup days you'd have fewer IP addresses than customers, for broadband you can't really do that). Customers having static IPs would make abuse much easier to trace.
    2. The initial sign-up would say "Would you like to be protected by our firewall?" with the default option set to YES. The vast majority of normal home users would get some default level of security (known troublesome services, including outbound port 25 filtered, and incoming CIFS filtered etc, plus all Microsoft executables for their ISP email address rejected automatically). People who select NO to this option will be warned of the dangers of doing so, but will have no filtering at all applied to their accounts.
    3. A system such as Snort would be run analysing incoming/outgoing traffic and looking for trouble. If a user is trojaned and sending out crap, they get the plug pulled.
    • Yes... this is a very good idea... so why aren't you the president of an ISP? Get your butt in gear my friend because the NET needs you to lead the way!

      As for the "commercial" reason in belgium cited in another reply... the reason for statics not being viable is that they cost more...

      Well, that is a concocted abuse of the system.

      How would you like it if every time you picked up your cell phone the telco injected a new telephone number? This would allow you to make outgoing calls. If you want to

      • Yes... this is a very good idea... so why aren't you the president of an ISP

        The market is saturated. I live on an island whose population is 76,000 and we have not one, but FOUR ISPs already. (One ISP only caters for business though). The wires are sold by a monopoly telco, Manx Telecom (they sell ADSL wholesale to the ISPs).

        However, one of the ISPs (Domicilium) has just been granted a license to use the fixed base wireless system to provide 5Mbit/s connectivity, competing with MT's wires. They haven't

  • Nice try ... (Score:2, Interesting)

    by foobsr ( 693224 )
    ... but: ... Telia will block are primarily those that have been infected with "trojans" which are being used, without the customer's knowledge ...

    would read better like ... Telia is helping customers who are infected to get rid and be more aware of ...

    Telia will learn that.

    CC.
  • I checked the stats for my web-site just the other day, and noticed that I still get a lot of requests for things like /scripts/..%255c../winnt/system32/cmd.exe and /default.ida?XXXX...
    Most of them comming from hosts on the Telia network. While I think its good they are finally doing something good for once (I left Telia when they blocked SMTP), will they do anything about all these Code Red and Nimda and all other old viri still on many of their customers systems?
    • I still get these along with code red attempts. But the most annoying thing is that my e-mail address is being used to propagate this stupid Microsoft update e-mail virus. I have had to resort to blocking hundreds of domains to keep it to a trickle, but I still reject upto 50 or more a day. It's REALLY getting old
  • Most spam source is spoofed in some manner, but equally most spam has a real URL or email address for the gulible to contact the spammer.

    If you are going to block anybody, block the ISPs that host the web sites and email reply addresses for the spammers - AND LET EVERYBODY KNOW in any error messages you issue. Blocking the real or apparent source of the spam itself is ineffective in the long run.
    • If you are going to block anybody, block the ISPs that host the web sites and email reply addresses for the spammers

      The spammers have already thought of that. One thing they do to counter it is to have to URL point to a trojaned PC, and to change the DNS every few minutes to rotate through a large pool of such owned machines.
  • by Ffakr ( 468921 ) on Tuesday November 04, 2003 @11:19AM (#7386431) Homepage
    quick question..

    If I'm the president of Globaldex Inc.* and a Trojan is spamming products for my company, why doesn't someone of authority (aka. Law Enforcement) come to me and ask a few questions. You know, crazy stuff like, who did I contract to send out email advertisements and such.
    I'd imagine that if 1000 computers got broken into by a Trojan, and they are spamming for Globaldex, it would be reasonable to consider Glabaldex an accomplice until they were able to clear themselves.

    Why exactly are prople getting away with this?

    * Gloabaldex is not real BTW
  • Well, It did not happen to me, but I had from a reliable source that videotron [videotron.ca] (my own ISP as well) started blocking computer infected with some most popular worms/trojan.

    I do not know how they do the detection part, but one of my colleagues came for advice on how to clean/up secure his own PC, because it was shut down from the network.

    Their method is really simple:

    • John Doe machine is infected
    • It is shut down from the network
    • John Doe calls to investigate what's wrong
    • Get an explanation, is reconnected
  • ... is to kick those of the 'net, that are not capable of administrating their box. In my opinion that should actually be required by law.
  • While I like the fact that my ports 20, 21 [ftp], 22 [ssh], 80 [apache], 110 [pop], 443 [apache-ssl] and 3306 [sql] are open, any others might well be too many.

    I used to get many connection attempts on port 135; but not having any active daemon on it, not much happened {though invariably the far end would be listening on that port}.

    I cannot think of a single reason why anybody would want to expose ports specific to a Microsoft LAN to the outside world. Sometimes I wish there was a "networthiness" test
  • This is not the whole story. Not all of Swedish Telia spam are "viruses." Many (most) are from commercial outfits that use Telia's services with its full knowledge. I wish they would boot them out too. Until they do, I recommend blocking these addresses (all class B, /16): 62.20, 62.107, 194.22, 195.198, 217.208, 217.209, 217.210, 217.211, 213.64, 213.64, 213.166.

    These are not all of Telia's blocks but only ones I have received spam from in the past year. Put tem in your /etc/mail/access file. E.g.:

  • My ISP, in their infinite wisdom, has decided that blocking ICMP (as well as a bunch of other things) is the way to go. They think that providing such 'protection' services will help prevent trogans and hackers. Meanwhile, traceroute and ping do not work. Interesting, because since tehy started their lovely protection racket, the service has gone to utter shit, and I am unable to even tell -how- bad it is. Many times the latency is so bad I'm unable to ssh to remote hosts at all. The connection goes down at

"If it ain't broke, don't fix it." - Bert Lantz

Working...