Print

Print


The tubes are now in the ground --- not hanging in the sky.  Maybe it is 
time for a revised edition?

;-)

-Tom

Richard Wiggins wrote:
> But the Internet IS made up of lots of tubes!   I have photographic evidence:
>
> http://archives.obs-us.com/obs/german/books/wiggins/cover.gif
>
> /rich
>
> On 10/25/07, Kwiatkowski, Nicholas <[log in to unmask]> wrote:
>   
>> I would have just blamed it on the "tubes" :)
>>
>> Sorry, bad political joke.
>>
>> -Nick Kwiatkowski
>>  MSU Telecom Systems
>>
>> -----Original Message-----
>> From: MSU Network Administrators Group [mailto:[log in to unmask]] On
>> Behalf Of Vasquez, Timo
>> Sent: Thursday, October 25, 2007 8:52 AM
>> To: [log in to unmask]
>> Subject: Re: [MSUNAG] E-mail Issues
>>
>> I have been in a similar situation with a clearing house email because
>> of a customers infrastructure upgrade and their lack of that knowledge.
>>
>> I was the network manager and being put on the spot to answer why it
>> took several hours for a simple mail with one attachment only 230kbs (if
>> memory serves me).  Then I was expected to track the message as if it
>> were a fedex package.
>>
>> The only thing I could do was prepare a simple visio diagram of our mail
>> system, then show how it went out our building using a tracert command
>> result that I included in a graphic representation.  I then requested
>> that I be in touch with this companies IT staff to provide the same kind
>> of document so I could represent the "start to finish"  This clearing
>> house is international so it was like pulling teeth, and it was done
>> after a week and 5 more days of late emails.
>>
>> Turned out two reasons for delay. They had a new spam filter called Spam
>> Assasin that had not been fully "tweeked" to suit their big organization
>> yet. The mail my user was sending had a html type signature that
>> referenced an image that pointed to our corporate web site.  So it was
>> being examined and then sent through in plain text style with
>> attachment.
>>
>> From that day forward I requested that diagram for all our client base,
>> and if some of them had emails from yahoo, hotmail, Comcast and aol for
>> their desired reciving account, I had a disclaimer that I can not
>> control the paths for public venues so delays; though unfortunate were
>> not the fault of (my old company).
>>
>> So that is the three angles:
>> 1.our environment (which can be the cause but is the only tangible part
>> we control)
>> 2.the isp between us and the recipient, and
>> 3.the recipient environment (where everything from their ISP, Network
>> based Spam Filters, and Desktop Solutions are usually the problem and
>> kept from us doing the technical troubleshooting)
>>
>> If I ran the network equipment here and controlled the mail server you
>> send from I would go out of my way to get you your answer... Good luck
>> to you and I am sure some of the people here on this list will help you
>> settle your issue.
>>
>> Timo
>>
>> -----Original Message-----
>> From: MSU Network Administrators Group [mailto:[log in to unmask]] On
>> Behalf Of Laurence Bates
>> Sent: Wednesday, October 24, 2007 2:12 PM
>> To: [log in to unmask]
>> Subject: Re: [MSUNAG] E-mail Issues
>>
>> Yes, but what do you tell upper level administrators when they find that
>> a
>> major funding source is being jeopardized by untimely email
>> communications?
>> Relying on what you hear from people is convenient but not very
>> sensitive to
>> their real concerns.
>>
>> -----Original Message-----
>> From: Brian Martinez [mailto:[log in to unmask]]
>> Sent: Wednesday, October 24, 2007 1:40 PM
>> To: [log in to unmask]
>> Subject: Re: [MSUNAG] E-mail Issues
>>
>> All,
>>
>> I would like to point to my original in-depth thread on the matter of
>> greylisting:
>>
>> http://list.msu.edu/cgi-bin/wa?A2=ind0704&L=MSUNAG&P=R995&I=-3
>>
>> Furthermore, I would like to go even more in-depth and touch upon
>> several things to make sure we are all on the same page about this.
>> There are going to be lots of numbers, so please read closely:
>>
>> ------
>> * A sender only needs to send 1 message, not 3 messages.
>> * A sender does not a receive a flat out rejection, merely a 451
>> Temporary Error.
>> * A sender not in our database has to go through the greylisting delay,
>> sender's who have passed the test should get through without exception
>> * With a properly configured SMTP server, most senders can get through
>> the greylisting process in well under one hour.
>> * Our SMTP daemons at mail.msu.edu are configured to respond to 451
>> Temporary Errors as such:  retry sending the message every five minutes
>> for fifteen minutes.  Failing that, retry the message every ten minutes
>> for one hour.  Failing that retry sending the message every two hours
>> for 16 hours, and so on...
>> * As I write this there are currently 1,109,396 hosts who we "trust"
>> Naturally, some of them are spammers, but most of them are not.
>> * The above number grows every single day/hour/minute.
>> -----
>> The following should give you an idea of the exceptions we make.
>> These folks completely bypass the greylisting process:
>> * We maintain a list of exceptions for nearly all .gov addresses in the
>> United States (we generate it based off of our logs), currently at 4,242
>>
>> listings
>> * We maintain a list of exceptions for every host here at MSU that
>> carries a valid MX record, currently at 341 listings
>> * We maintain a list of miscellaneous hosts of people who were privy
>> enough to go through our Help Desk and make sure their email goes
>> through as expected.  We have helped a few hosts reconfigure their mail
>> servers to meet the RFC spec., currently at 151 listings
>> * We auto-generate a list of larger domains who carry SPF records, AOL,
>> Google, Amazon, Hotmail, Microsoft and more recently Fidelity
>> Investments, currently at 129 listings
>> * The website greylisting.org provides a list of hosts who have
>> difficulty bypassing anybody's greylisting setup.  Including Southwest
>> Airlines, MoveOn.org, lists.mysql.com, and ameritradeinfo.com to name a
>> few.  This only has 22 entries.
>> ------
>>
>> You'll note from our stats page:
>> http://project.mail.msu.edu/~rrdtool/spam.php   That we have easily
>> dropped 600,000 pieces of spam PER DAY since we implemented
>> greylisting!!  Of course spam still does come through, and some
>> legitimate email does get dropped.  But with folks knowing that they are
>>
>> expecting a piece of email and it hasn't come through, they know to hit
>> up our Help Desk and we work through to resolve the problem.
>>
>> I have not heard a single complaint about greylisting until just
>> recently, so I hope this helps put things in perspective and helps clear
>>
>> things up a bit.  As Nick noted earlier, greylisting is system-wide.  It
>>
>> sits as a transparent-bridge between the Internet and mail.msu.edu.  The
>>
>> vast majority of people sending to us (nearly 1,110,000 different hosts)
>>
>> do not even know they have gone through greylisting.
>>
>> If there is email _not_being received, the best method for finding out
>> is testing with outside sources first, such as Gmail/Yahoo/Hotmail/etc.
>>
>> Then calling our Help Desk and providing them with full headers from the
>>
>> successfully received message at whatever 3rd party address that was
>> used.  We will then investigate the issue and determine if its
>> greylisting or not, and if it is, we will see if it is possible to have
>> their mailer reconfigured properly.  If that is outside of the scope of
>> the person attempting to mail us, we will work to add them to our
>> exceptions list (which also seems to grow weekly as of late).  Of
>> course, if the issue is not greylisting, we will work to find the
>> appropriate area to move the issue into.
>>
>> If people are so inclined, then anyone is obviously free to migrate
>> elsewhere.  I wanted to make sure as many facts as I could recall were
>> clear before anyone decides to go anywhere else.  It is a very
>> trustworthy system and the majority of people I hear from swear by it
>> and are quite happy it is in place.
>>
>> Regards,
>> ./brm
>>
>>
>> __________ NOD32 2614 (20071024) Information __________
>>
>> This message was checked by NOD32 antivirus system.
>> http://www.eset.com
>>
>>