ICANN ICANN Email List Archives

[gnso-ff-pdp-may08]


<<< Chronological Index >>>    <<< Thread Index >>>

Re: [gnso-ff-pdp-may08] Definition V4.2

  • To: mike@xxxxxxxxxx
  • Subject: Re: [gnso-ff-pdp-may08] Definition V4.2
  • From: Joe St Sauver <joe@xxxxxxxxxxxxxxxxxx>
  • Date: Tue, 29 Jul 2008 12:21:30 -0700

#new version on the web site;
#
#https://st.icann.org/pdp-wg-ff/index.cgi?initial_draft_definitions

Compare that definition to the one that Spamhaus has at
http://www.spamhaus.org/faq/answers.lasso?section=ISP%20Spam%20Issues#164

What is "fast flux" hosting?

        Fast flux domain hosting involves the use of botnet zombie 
drones on broadband IPs infected to act as reverse proxies for the 
spammer's website or nameservers. The spamvertised domain, or its 
nameserver, is pointed at a rapidly changing series of zombie IPs (hence 
the name) with very short "TTL" values -- usually less than five minutes 
(300s). There are typically four or five "A" records to distribute the 
load and increase the odds of the website staying up. Their proxy 
service hides the IP location of the spammer's dedicated servers. As the 
very action of hijacking computers is illegal in most jurisdictions, 
such fast flux hosting is only used for further criminal activities such 
as phishing and child pornography. Because the criminals know they could 
be identified if they used valid "whois" data, they always use bogus 
data, so registrars can confidently HOLD (suspend) the domain based on 
ICANN 3.7.7.2.

[additional text and examples omitted here to avoid triggering spam 
filters]



<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy