On Tue, 20 Feb 2007 12:57:54 -0800, "Brian Keefer" <[EMAIL PROTECTED]>
said:
> On Feb 20, 2007, at 12:36 PM, Darren Spruell wrote:
> 
> > On 2/20/07, Brian Keefer <[EMAIL PROTECTED]> wrote:
> >> In the case of a greylisting type of solution, it seems that
> >> identification would be especially devastating since the work-around
> >> is so trivial.  Unless my understanding is very wrong, the whole
> >> effectiveness of the solution depends on the spammers not realizing
> >> the difference between a "normal" MTA and one that greylists.
> >
> > The reason that greylisting has been effective is because spammers
> > apparently don't waste resources on maintaining queues and attempting
> > redelivery later. Why worry about redelivery to 500 temporarily failed
> > recipients when in the same time and processor cycles you can delivery
> > to 500,000 more mailboxes?
> 
> Historically true, but the tighter anti-spam defenses become, the  
> more it's worth it to put a little extra effort into reaching  
> "defended" mailboxes.  Also, if the spammers can figure out the  
> difference between an error because a mailbox is full, user doesn't  
> exist, etc and the fact that they're talking to a greylisting daemon,  
> it's worth it to make the effort if they can bypass a spam filter,  
> where as it's really not worth retrying of a user's mailbox is full  
> or they don't exist.  Whether it's worth retrying depends on why the  
> original delivery attempt failed.  Right now it's probably still not  
> worth doing, since there are so few greylisting systems deployed.   
> Eventually it might be worth it.
> 
> >
> > It (in practice, apparently) matters not to the spammer if they've got
> > an antispam measure returning a 45x error or a legitimate MTA. If you
> > were a spammer, and thought that working around 450s from spamd was
> > worth wasting resources on to reattempt delivery, why wouldn't you
> > just reattempt delivery on any temporary error under the hopes that it
> > will succeed?
> 
> See above.
> 
> > By definition a temporary error will go away at some
> > point if you reattempt delivery.
> 
> Depends what the error was.
> 
> >
> > For every point that someone has brought up against greylisting (from
> > since it was originally proposed by Harris in 2003), it continues to
> > work effectively. So while people adopts this
> > sky-is-falling-spammers-will-figure-it-out-soon mentality, the numbers
> > don't lie. Greylisting has been, still is, and will continue to be for
> > some time at least an effective measure.
> 
> This is the part where I believe I'm being misunderstood.  I'm not  
> saying that greylisting is necessarily bad, and I'm not saying that  
> it's ineffective.  What I am saying is that I think it could be even  
> more effective if it was more difficult for spammers to recognize a  
> difference between unprotected and protected systems.
> 
> How spammers are behaving right now doesn't necessarily predict how  
> they're always going to behave.  A particular technique for fighting  
> spam has to be pretty wide-spread before spammers will spend the time  
> to figure out the flaws.  I've worked in e-mail for about 8 years,  
> starting with a hosting company that had millions of e-mail boxes and  
> hundreds of thousands of domains, then two different e-mail security  
> companies.  The one thing I've noticed is that no one method of  
> fighting spam is a panacea.
> 
> Originally when "Beysian filtering" was proposed, it was supposed to  
> be the Final Ultimate Solution for Spam and everyone was gushing on  
> all the usenet groups and mailing lists about how great it was and  
> how they never got a single piece of spam any more.  A lot of  
> commercial solutions rushed to include Beysian-based techniques, but  
> eventually spammers overwhelmed it and you don't hear much about it  
> any more since it's just not effective as spam evolved.
> 
> Recently spammers have taken to sending "image based spam".  I'm sure  
> anyone who follows spammers is familiar with it, but it's pretty  
> sophisticate and is pretty successful at evading OCR-based systems.
> 
> Any way, the point is that nothing is perfect and, in my experience,  
> you have to keep evolving the techniques to stop spam as the spammers  
> evolve their techniques to avoid being blocked.
> 
> Obviously in the case of greylisting and spamd, the goal is to avoid  
> being put on the blacklist in the first place, and one way to do that  
> would be resending to avoid being assumed a spammer.  When I first  
> started fighting spam, all the spammers had to pay for their  
> rackspace, DNS hosting, bandwidth, etc and usually they had to pay  
> above average prices because of all the headaches they caused for  
> their providers.
> 
> Now they've evolved to using botnets and the vast majority of spam  
> comes from such systems, so the bandwidth costs are gone and the  
> hosting costs are pretty much limited to how much they have to pay  
> the criminals for the botnet C&C passwords.  It's not a matter of  
> cost any more, it's a matter only of efficiency.  If they make more  
> money by spending some cycles to resend, they'll do it.  Your average  
> spammer might be pretty dumb, but the people who are writing their  
> tools are usually pretty clever.  I wouldn't underestimate them.

OK, now please propose a solution.

Reply via email to