We’re seeing an increase in the amount of…

Wed Feb 21 17:26:09 PST 2001 — We’re seeing an increase in the amount of SPAM being blocked and also being delivered to Sonic.net customers. We are doing many things here to block as much SPAM as we can. We’ll continue to develop additional methods of blocking in an effort to reduce the clutter in your email inbox.

Remember, do not reply to SPAM with remove requests; this just validates you as a responsive target. Instead, report it in order to shut the spammer down at the source. A great resource for automatically filing SPAM reports is SpamCop at www.spamcop.net/. You may additionally bounce or redirect SPAM with full headers to spam@sonic.net; messages received there are reviewed in order to continue to enhance our own blocking and filters.

Sonic.net uses a number of anti-spam efforts currently, including:

Subscription to the Mail Abuse Protection System (MAPS) “Plus” system, including the Realtime Blackhole List (RBL), Relay Spam Stopper (RSS) and DialUp List (DUL). For info on MAPS, see www.mail-abuse.org/. The majority of inbound SPAM is blocked by this tool.

Rejection of email from invalid sources. Email coming from domains which are not valid (correction) or which are malformed is rejected. Quite a bit of SPAM is sourced from entirely invalid domains, and is blocked by this filter.

Rejection of email from our own internal blacklist of SPAM source domains (1828 domains) and SPAM source email addresses (2592 addresses). These two lists have been generated primarily from user SPAM redirected to spam@sonic.net or posted in news:sonic.spam-can A rather small amount of spam is blocked by these blacklists, as they spammers have generally moved on to new domains or email addresses with each new wave of emails.

For further discussions about SPAM and anti-SPAM efforts, please read and post to news:sonic.spam-can.d

-Dane

Congestion avoidance.

Tue Feb 20 11:06:47 PST 2001 — Congestion avoidance. A colo site had incorrect permissions on some of their directories, which prompted scurrilous ruffians to upload DIVX files for illicit distribution. The resulting demand caused saturation on our T3’s, with as much as 3% packet loss on our Internet circuits. While this does not seriously interfere with ordinary use of TCP/IP, it does cause TCP to enter “congestion avoidance”, which means TCP streams slow down to prevent packet loss. We have corrected the situation; the saturation has stopped, and traffic is now moving normally. Please visit news:sonic.net for questions about congestion avoidance. -Scott, Matt, Rob, and Mike

Emergency admin server downtime.

Tue Feb 20 13:39:26 PST 2001 — Emergency admin server downtime. We had to reboot our core administrative server. This could have resulted in slow DNS response while the server was down but should not have affected other normal Internet usage. Membertools were also unavailable while the host was down. -Scott & Kelsey

Night Operations: Tonight we are performing a

Thu Feb 15 16:35:06 PST 2001 — Night Operations: Tonight we are performing a series of security updates throughout our network. We will be rebooting a number of our servers to bring them up on new Linux kernels and doing ACL work on our border routers to help mitigate the impact of a DOS on our network. We do not expect any significant down time on any of our services and, due to our load balancing, major services like email and web should be unaffected.

We will also be finishing the upgrades to our core switch, Ape, and we may need to reboot it when we are finished. If we do need to restart it, there will be a 90 sec complete network outage as it restarts.

-Kelsey, Scott, Chuck and Matt.

Update on mail servers.

Wed Feb 14 10:35:13 PST 2001 — Update on mail servers. We have isolated the source of the attack and it appears that it is a mailbomb attack targeted at specific users. We have escalated the attack to the remote upstream providers and have successfully blocked the attack. -Scott, Steve, Kelsey, and Russ

Attack on mail servers.

Wed Feb 14 10:22:39 PST 2001 — Attack on mail servers. Our entire mail server array has been impacted by what appears to be either a) a rude or misconfigured mail host, or b) a denial of service attack. We decided to treat the situation like an attack, isolate the source, block the attack, and then harden our servers to prevent future attacks of this nature. We have completed all but the latter step, which pends further analysis. -Scott, Steve, Kelsey, and Russ

Update on DSLAM 1.

Tue Feb 13 11:00:54 PST 2001 — Update on DSLAM 1. It appears that PacBell resolved the issues with DSLAM 1 here in Santa Rosa. If you still are experiencing difficulties with your DSL please let us know. -Dave

Update on DSLAM 1.

Tue Feb 13 15:24:23 PST 2001 — Update on DSLAM 1. DSLAM 1 is now completely offline. We do not have an ETR but will post one as soon as we hear from PacBell. This only affects some DSL customers in Santa Rosa. -Dave