SPEWS: Spam Prevention Early Warning System, is a Black List (BL), a list of denied and banned IPs addresses, used by great ISPs.

Who's behind the acronym SPEWS? Nobody you can know, they say only that somebody reads and posts about spews on the newsgroup nanae (news.admin.net-abuse.email). It's clearly true since their BLs are modified by considering the posts on this newsgroup, but for the rest there's no e-mail address, no website, no recipient. The spews.org website is said to belong to them but it's registered under an alias and on the website they declare not to be SPEWS.

An introduction to SPEWS policies can be read in the updated encyclopedia wikipedia (Keep it in mind that everybody can modify this information on wikipedia, so read with caution).

Once spews.org was in Siberia, registered in Irkutsk, now in Australia. On the website you can read that american and european companies with wide economic and legal availabilities have less hopes to sue the spews crew this way.

Spews delivering systems are different and independent but one speaks only about a list of IP addresses anyway, the ISPs that use spews can ignore some listings at their discretion, or a priori guarantee that certain entities won't be blocked if spews decided to ban them. For this purpose they use White Lists mainly based upon the e-mails of their own customers.

Furio Ercolessi, an outstanding representative of the antispam italian world, states the way of working of the administrators that use SPEWS.

In his opinion this is the usual way for anybody who runs an antispam system or uses SPEWS or other lists: "The lists only just provide a default, then everyone decides what to throw away or locally add". Ercolessi goes on speaking about his way of working: "As for us, we never refused a whitelisting to anybody who got in touch with us after a SPEWS block of regular mail".

Secondly there are two attention's levels for the spam you get, two distinct lists so that every entity that goes into level 1 (the one commonly used in order to block) has usually already passed much time in level 2. This allows the sys admin a flexible and personal management.

From the ISPs that host spammers or have spam problems, their network's presence in level 2 and not in level 1 is a warning sign that shows a risk situation and can often last for months. This allows both SPEWS users and the "victims", who don't read their abuse@ boxes, to identify the warning situations weeks or months before level 1 turns on.

On the website spin.it, a commercial reality of Internet services where Ercolessi works, they operatively deal with the methods spin uses to filter mail, various BLs and their using ways are examined. The manifesto of their antispam policy can be read in these foreword sentences:
"Every e-mail that from outside goes into the Spin web, is subjected to a chain of filters in order to check the incoming spam, before being distributed to the user. All the filters exclusively work at SMTP level on the basis of the message's source or, seldom, of "signatures" found in the headers".

"No antispam system's filter tests the message's content. We think that the filters based on the content are a wrong method to face the spam problem, as they are subject to errors and false alarms, need much maintenance and, most of all, don't strike the problem at the root: a direct pressure on the sources and on spam's vehicles is necessary to fight the phenomenon on full scale. By exposing themselves and by siding in the front line against the spam, Spin clearly wants to declare this idea: marketing methods, which are based on unsolicited bulk delivered e-mail, are highly harmful for the future of the electronic communications among people and companies".
How many are the mail boxes whose incoming mail is filtered by SPEWS? One speaks about 10^8, around 100 million boxes.  How many IPs are banned? How many are the servers present in SPEWS BLs?

On nanae somebody said:
Well, not that this is a very meaningful test, but SPEWS is blocking about 0.15% of the 32bit IP space.

$ perl -e 'while(<>) { $t += 2**(32-$1) if (m!^[\d.]+/(\d+) !); }
print "$t ", $t/(2**32)*100, "%\n";' spews_list_level1.txt
6280997 0.146240857429802%
So they speak about percentages around one per thousand of all the IPs. These data aren't especially significant as there's no correspondence between IP number and the mailserver, anyway it gives an idea.

And now the most recurrent question: Why does SPEWS take the liberty of banning national ISPs or Yahoo! or AT&T or my server smtp? The answer is: because the Internet users confide in it.

We are going to see the long reply to this interesting controversy, this short essay was really caused only by this wish: to explain SPEWS policy.

It's basic to understand that the Black Lists are public and downloadable on the Internet, the SPEWS one is present in several sites.
 
The administrators download and use it with other lists for the customers' mail, so the sys admin trust SPEWS Black Lists, a person who chooses these services indirectly confides in SPEWS.

If you wonder why many system's administrators choose these Lists, you should consider that the Web is anarchic, cooperative, punishes those who don't follow the netiquette, is based on computer scientists or technophiles and Linux or *nix systems are greatly present. For all these reasons we can say that the sys admin are people close to the Hacker's ethics and culture.

SPEWS represents all these things, this is surely policy, but technophiles' policy, a policy whose roots are in the Web's correct working. By summing up SPEWS policy is an effective practical picture of the Hacker culture.

Let's see SPEWS policy (from Collinelli's italian site):
First of all the provider who finds his own netblock in Spews must solve the problem (i.e. to get rid of his spammers, to arrange his open-relay servers, to delete trojans, ecc. and to run the abuse desk), then if this cleaning work is complete and convincing, the listing will be taken away at the right time and according to the shown antispam task.

It's evident that if the spammer isn't banned by the provider at once, that netblock will be destined to remain listed at length, indifference's cases can take it to be banned for very long times and then cause the so-called "netblock escalation". As spam continues the SPEWS listed block will rise in dimensions (Of course everything happens in the sphere of IP space that's under the responsibility of the same provider).

The evidence files, readable on Spews website, often show these escalation's cases: at the beginning few IPs, that get directly involved in some spam, are usually listed, but after some time all the "/24" (i.e. 255 adjacent addresses) can be listed according to the cases, then if the spam goes on and the addresses' holding provider is left inactive, the listed blocks become greater and greater (for instance "/20" or "/19"). These escalations often end by including IPs addresses, used by provider's customers that have nothing to do with the spam.
This is the discussed point, the one that several sites' onwers on spammers hosting provider don't like. In this way every sort of commercial interest is struck. There are Verio-hosted companies whose e-mail is blocked, Yahoo! whose egroups are useless, important Chinese Internet access providers put in the SPEWS Black Lists.

However Spews has got good reasons to do this: for instance to prevent the provider from avoiding the Black List by moving the spammer on yet unlisted addresses that belong to it anyway, or by using other customers as a kind of "human shields". Moreover, as the spam problem is largely economic-natured, only an economic reason can lead some providers to give up spammers' money (for instance the fact that non-spammer customers go elsewhere).

It seems that SPEWS has some spam-traps, i.e. unused mailboxes that act as spam-traps, besides this there are spam-cataloguing websites. Anyway intercepted spam's consequence is that the provider's abuse desk is warned that there is a spam source from an IP which belongs to it, the message isn't signed by SPEWS but by regular users: this is how it should work.

If the abuse doesn't act at once or worse the abuse desk isn't working, the IP is put in the BL and in due time the pressure begins with netblock extension in BL so much that the entire provider is obscured and a note appears declaring the IP provider's spamming will. You can follow the timing of this process on nanae, by focusing the single cases that cooperate or not, with completely different BL times.

I still remember that it takes many weeks or months to switch from level 2 to level 1, the one generally
used by the providers, therefore terms like "they suddenly blocked our e-mail" are, by blacklisted ISPs, as much usual as uncalled-for and indicative of carelessness, indifference or even bad faith.

Even if I've said many times that SPEWS bans several servers, it's actually false as SPEWS confines itself to listing. If a sys admin considers it as a believable list, it will use this list to block with the attentions described by Ercolessi.

We can put it this way: if it were merely arbitrary, nobody would use it and even if I have no data, SPEWS seems to be the second or third more used listing, after SBL and MAPS.

The political relapses caused by this way of SPEWS operating are various: besides those already seen, the BLs are a kind of economic compensation that adds expenses to the spam-friendly ISPs, and therefore favours the whitehats that refuse profitable business with the spammers and must keep up costs that the others don't, for instance human staff behind the abuse desk, to worry that spam doesn't start from their own network, ecc. ecc.

A side of the ISPs responsibleness is that sometimes these aren't interested in leaving the spammers, if the provider is an important national administrator, the consequence is an obscuration of parts of a nation, like the Chinese case. Yet the most informed users can always use services far from spamming logics and still about China Ercolessi said:"And in fact there are well administrated Chinese ISPs that don't certainly enter SPEWS (like Chinanet-Jiangsu for instance), though
belonging to the same geographic area as the great spam-friendly ISPs".



The website spews.org/bounce describes how to behave if your e-mail has been bounced, in the explanatory page they say:
"Many people find this website after they receive a bounced email telling them that their original email was rejected..."

"If you bothered coming to this page, you are probably an innocent email user who's email has bounced."

"We know that, as a user of the Internet, email and other connectivity is important to you. We also know that unsolicited bulk email (spam) is bad. We encourage you to ask your Internet Service Provider (ISP) to fix the problem which has resulted in your mail bouncing or whatever other effects of being listed in SPEWS you may be experiencing."
Spews.org provides a service to understand the reasons of your e-mail bouncing: at this link, by
filling in the form on high (a small box to fill up) with the IP number of your mailserver (a number like 100.99.101.98), you will get explanations.



I thank Furio Ercolessi and Cataldo Cigliola for their precious information and the interesting conversation via ng that allowed me to add different points to the discussion.


Links:

SPEWS website,
if spews website is off line you can get information about spews on wikipedia,
Ercolessi recommends the reading of Jeffrey Race's essay in .pdf, "that focuses the question very clearly".

The most famous, hated, under attack and hacker spammers' Black List at the moment, SPEWS: Spam Prevention Early Warning System.

english.kensan.it