On Mon, 01 Mar 2004 18:11:12 -0500, Yakov Shafranovich wrote:
In regards to this specific method, we are currently
looking for volunteers to write a BCP on this and other methods of
dealing with hijacked machines from the originating network's point of
view
It's done already :)
<http://www.camblab.com/misc/univ_std.txt>
based upon
<http://www.camblab.com/nugget/spam_03.pdf>
Jeffrey Race
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg