begin  quoting John H. Robinson, IV as of Wed, May 18, 2005 at 11:21:38PM -0700:
> Stewart Stremler wrote:
[snip]
> This is pretty easy for a mindless smtp server to get around: send out
> the spam;   send the same one out again in (say) six hours. If the
> unique tokens are hashed through the target address, it is a simple
> matter to go through the list twice. If the mail goes through twice, so
> much the better!

Open relays are generally considered a Bad Thing.

And if you link into an RBL, hopefully the IP of the mindless smtp
server can end up in the RBL in six hours.

> I'm not actually interested in writing the code to test this theory.
 
Plenty of real-world sources of spam out there already.

-Stewart "Why simulate spam when the real thing is close at hand?" Stremler

Attachment: pgpoPyZ86MEjA.pgp
Description: PGP signature

-- 
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to