Feeds

Dutch ISP calls the cops after Spamhaus blacklists it

Had to unfriend TPB chums to get unblocked

Providing a secure and efficient Helpdesk

Dutch ISP A2B Internet has filed a complaint with the police after it claimed to have been "blackmailed" by London-based anti-spam outfit Spamhaus.

A2B managing director Erik Bais told Webwereld (report in Dutch) that Spamhaus "has gone too far".

The Spamhaus Project is an international organisation, founded by Steve Linford in 1998, dedicated to tracking email spammers and spam-related activity. It is responsible for a number of widely used anti-spam DNS-based block lists (DNSBLs). Many ISPs use these services to reduce the amount of spam they take on.

Spamhaus put in a request to block all data traffic from German ISP Cyberbunker, aka CB3ROB, best known for helping out torrent site The Pirate Bay. But Cyberbunker has several server racks with a partner of A2B. A2B, as an upstream provider, refused to block the full IP range of Cyberbunker and decided to block only one particular IP address that Spamhaus had identified as a source of spam.

According to Bais, Spamhaus then decided to include the full IP range of all of A2B's customers in its block list. Several companies were practically offline as a result and couldn’t send or receive email.

Finally A2B gave in and decided to remove Cyberbunker from its BGP (border gateway protocol) list, used for exchanging routing information between gateway hosts. Almost immediately, A2B could resume its normal duties. "Spamhaus cannot be its own judge," Bais told Webwereld.

Several years ago, Spamhaus used similar tactics when it put Austrian Registry Nic.at on its block list. Spamhaus demanded that the Austrian Registry delete 15 domains that the spam-blockers considered to be used by phishers, without providing enough evidence to satisfy Nic.at. Nic.at responded that — because of Austrian law — it could not simply delete domains without proof of bogus WHOIS addresses.

A2B director Erik Bais told Webwereld: "I will certainly raise this issue at the next RIPE [Réseaux IP Européens, or European IP Networks] meeting."

Spamhaus's Steve Linford said: "To say that an SBL listing amounts to extortion is the same as being refused entry to a restaurant because you're not properly dressed, and then claiming that you are being blackmailed." ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.