Feeds

Dutch ISP calls the cops after Spamhaus blacklists it

Had to unfriend TPB chums to get unblocked

Choosing a cloud hosting partner with confidence

Dutch ISP A2B Internet has filed a complaint with the police after it claimed to have been "blackmailed" by London-based anti-spam outfit Spamhaus.

A2B managing director Erik Bais told Webwereld (report in Dutch) that Spamhaus "has gone too far".

The Spamhaus Project is an international organisation, founded by Steve Linford in 1998, dedicated to tracking email spammers and spam-related activity. It is responsible for a number of widely used anti-spam DNS-based block lists (DNSBLs). Many ISPs use these services to reduce the amount of spam they take on.

Spamhaus put in a request to block all data traffic from German ISP Cyberbunker, aka CB3ROB, best known for helping out torrent site The Pirate Bay. But Cyberbunker has several server racks with a partner of A2B. A2B, as an upstream provider, refused to block the full IP range of Cyberbunker and decided to block only one particular IP address that Spamhaus had identified as a source of spam.

According to Bais, Spamhaus then decided to include the full IP range of all of A2B's customers in its block list. Several companies were practically offline as a result and couldn’t send or receive email.

Finally A2B gave in and decided to remove Cyberbunker from its BGP (border gateway protocol) list, used for exchanging routing information between gateway hosts. Almost immediately, A2B could resume its normal duties. "Spamhaus cannot be its own judge," Bais told Webwereld.

Several years ago, Spamhaus used similar tactics when it put Austrian Registry Nic.at on its block list. Spamhaus demanded that the Austrian Registry delete 15 domains that the spam-blockers considered to be used by phishers, without providing enough evidence to satisfy Nic.at. Nic.at responded that — because of Austrian law — it could not simply delete domains without proof of bogus WHOIS addresses.

A2B director Erik Bais told Webwereld: "I will certainly raise this issue at the next RIPE [Réseaux IP Européens, or European IP Networks] meeting."

Spamhaus's Steve Linford said: "To say that an SBL listing amounts to extortion is the same as being refused entry to a restaurant because you're not properly dressed, and then claiming that you are being blackmailed." ®

Beginner's guide to SSL certificates

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
US government fines Intel's Wind River over crypto exports
New emphasis on encryption as a weapon?
To Russia With Love: Snowden's pole-dancer girlfriend is living with him in Moscow
While the NSA is tapping your PC, he's tapping ... nevermind
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
Put down that shotgun: Wi-Fi's the way to beat Zombies
CreepyDOL sensors can pick walkers from humans with MAC snack attack
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.