Nobody wants to be tied to their job over the holidays, but what if someone has hacked your servers and is using your machine to scam thousands of people a day? Does that keep for two weeks? Does someone monitor the abuse address? Incidents.org has a post on messages they’ve got from some reporting to abuse administrators receiving back vacation notices that things are basically on “autopilot until sometime next year.”
They also have some other reminders which I know I need to refresh my memory on…
Unless you turn off the systems, they will still need a bit of watching and caring. Do you have someone on call in case the burglar alarm goes off? Make sure you have someone checking the ‘abuse’ or ‘security’ mailboxes once a day (at least). You may have them even forwarded to a pager if you can filter the spam.
And while I am on the topic: Make sure you do actually have an ‘abuse’ and a ‘security’ alias for all of your domains. There are a number of aliases you should define for each of your domains:
RFC2142 provides a number of references to other RFCs, and suggests the following aliases:
postmaster@domain (RFC822). This should exist on all mail servers. You should also have postmaster@IP-Address-of-the-mail-server.
usenet@domain (RFC977). I know a lot of people will write to say differently. But I consider usenet dead for all practical purposes. You can probably do without this address.
Take a look at your domain name and IP address whois entries and make sure they are current. For IP addresses, you may just find your ISPs contact info, which is fine as long as they notify you.
Spam to these addresses has become a problem. I don’t think there is a great solution, as some of the mail sent to these mail boxes may include copies of spam messages (even if you don’t send them, others may impersonate you and you still want to know. Abuse reports are one way you will find out).
That much said, if you’ve got all the bases covered, good for you. I think I need to make sure all the required addresses are aliased on the domains I control. Also, I hope that the holidays can be a quiet time that you don’t HAVE to go chasing problems, or respond to abuse messages….
Related PostsRelated Posts
- What a week.... I think it's time to pass along a long story of what's gone on over the last week or so here and some of the reasons there hasn't been anything posted. Generally, I would say that work has been busy, but something happened last week that went a bit beyond......
- Microsoft Outlook - duplicate email messages Part II This is part II, click here for part one of the saga... Okay, so I revisit to install Microsoft Office 2003 SP2 and hope that solves it. Somewhere along this time, I had also found a suggestion of removing the entire mail PROFILE and creating a new one. *(The theory......
- RealVNC 4.1.1 and prior exploits on the loose As reported over the last several days, there is a critical problem with RealVNC 4.1.1, there is NOW an exploit in the wild for RealVNC 4.1.1, that SANS is looking for more information on. There are updates from RealVNC for all affected product lines. Other VNC implementations have not been......
- Facebook List Messages - 2011's Powerful Alternative to Email Marketing Strikes Hard, and is more than just Effective. [/caption] Internet Marketing Strategies, particularly Email Marketing, have seen an overhaul of sorts this past year. Rising standards in Anti-Spam Compliance Regulations have forced most email service providers like Aweber, MailChimp and iContact to reevaluate their levels of "leniency" towards unsubscribe rates and spam complaints, and enforce stricter monitoring......
- Domains 101 With out a domain brand, websites tend to be specified by simply an IP address. What is an IP target? It can be an identifier which is used by personal computers or humans to view the location of your server and also website. However, for human beings, an IP address,......
- Is Social Security a Ponzi Scheme? (Part 2: An Explanation of Social Security Works) The following is a continuation of the Is Social Security a Ponzi Scheme? (Part 1). That article dealt with the history of Charles Ponzi and the original Ponzi scheme. In this article we'll cover the Social Security system in general. Social Security also works best as a pyramid There is......
- Persistent spammers
- Emails to abuse admins
- Great tip for Dealing with SPAM email
- Ways to deal with Junk Mail (1 of 2)
- AT&T rbl block inquiry site