On Fri, 27 Apr 2001, Markus Stumpf wrote:
> Sorry to jump in late.
>
> On Mon, Apr 23, 2001 at 10:26:05PM +0200, Erich Schubert wrote:
> > I do not drop them, i refuse accepting them. It's up to the sending relay to
> > decide what to do. Usually they get bounced.
>
> The problem we had is that we have users that depend on receiveing
> emails even from relay open mailservers, because they have business
> partners that use these servers.
> So blocking them is not an option for us as their ISP (we did, and we
> had to stop it). You can argue with your customers, but if they loose
> money or don't get some urgent data they don't care about SPAM.
>
> On the other hand, if you're a BOFH and you don't care about customers,
> it's easy to set up a default delivery for all unknown recipients, parse
> the headers and automatically add them to your own block list.
> If you run this for a few weeks, I'll dare to predict you won't get
> too much SPAM any longer, but you'll have a high false positive rate ;-)
I've got a guy hiiting me with a Rumplestiltskin attack.. Lots of
falsely generated usernames to deliver to, with to top it off, mutating
Subjects.. (Subject :R.A.n.D.o.M and etc), mutating from:'s, and remotely
queueing the messages on open relay's. What a pain. I did something
similar to what you did to ease the problem.
Kyle