Re: OT Boincing Spam

2004-12-26 Thread Tim B

What I've do now is:
1) Spam over a certain score goes to /dev/null
2) Spam under a certain score, and over a certain score go to spamtrap 
incase someone's looking for something.
3) Low scoring spam gets delivered the user with **SPAM** in the 
subject  which the users have a client side rules to move those to a 
spam folder.

That seems sane. What levels do you set?

First off, I use Postfix Policyd to greylist delivery.
With all the sare rules for SA 3.x, Razor, Dcc, and pyzor, I set our 
thresholds to:

Over 15 -- /dev/null
Over 9 -- /spamtrap
Over 5.5 -- Rewrite Subject
Most false positives fall between 5.5  6.5 (maybe 2 a day and it is 
usually due to a raher high score RBL). I have yet to have to into 
spamtrap to find good mail and I've used this for 4 months now.  Just 
once was I given a false negative.


Re: OT Boincing Spam

2004-12-26 Thread mazieres
On Sat, 25 Dec 2004 13:10:04 -0900, John Andersen [EMAIL PROTECTED] wrote:
 From your web page:
 
 Bodytest support - allows you to run filters like spamassassin and clamscan
 on the body of a mail message before replying to the final . of the SMTP
 DATA command. (See the edinplace(1) man page and the bodytest description in
 the avenger(1) man page.)
 
 This would imply that you hold the connection open from the sender till
 SA has had a look at the mail, (which may entail several network based hits
 in the process of checking surbl etc).  Does this not entail some rather
 large number of open connections on the mail server, some of which might
 time out when SA is working hard?

Yes, it does mean that there is a potential delay here.  I think the
biggest danger is that if you get unlucky, you could get a duplicate
mail message, if the client timed out but the mail ended up going
through.  However, in practice I'm running the software on several
production mail servers, one of which has hundreds of users (the
others are smaller), and I have not noticed this problem.  Usually
clients have a timeout of at least several minutes during the DATA
portion of the SMTP session, while spamassassin seems to take only
seconds or tens of seconds in the worst case.

Note that external network queries are fairly common during SMTP
transactions.  For example, almost all MTAs do reverse DNS lookups and
RFC 1413 ident lookups (the latter of which can be very slow for
clients behind firewalls that block TCP port 113).  Nowadays, servers
including Mail Avenger increasingly support SPF, which requires more
DNS lookups.  Mail Avenger also does its own RBL lookups if you ask it
to, which will prime your nameserver's cache before invoking
spamassassin.  (Mail Avenger does the lookups concurrently and before
the DATA command, so the latency is less and there is no chance of a
duplicate message.)  This doesn't apply to SURBL lookups, of course.

Further mitigating the problem, you can configure Mail Avenger both to
limit the number of concurrent connections and to limit the number of
connections from any given IP address.  Some MTA clients like certain
versions of qmail have a habit of opening 20 TCP connections to the
same mail server concurrently.  Mail Avenger can, if you so configure
it, accept 5 connections from a client, then tweak the kernel's
firewall rules to drop further SYN packets from that particular client
until one of the 5 existing connections closes.  Thus, instead of
having 20 connections stuck waiting for spamassassin on an overloaded
server, you'll have most of the connections waiting for the TCP
connection to complete (for which you usually have about 2 minutes),
and again no risk of duplicate messages.

So all in all I'd say you've identified a potential concern, and it is
something I worried about initially, but in practice it really doesn't
seem to be a problem.

 Also does avenger sit ahead of sendmail or is it called by sendmail?
 (Who is listening on 25? Avenger or sendmail/qumail?

Yes, Mail Avenger listens on port 25.  It needs to in order to
coordinate client connections with firewall rules, as well as to do
things like infer the client's operating system from its TCP SYN
fingerprints and determine the network route to the client while it is
connected.  We've seen some evidence that a few spam sources are
correlated with BGP route flaps, meaning that some spammers may be
temporarily stealing IP address space to send their spam.  Thus, it's
important to record the network path at the time of the TCP
connection.

Mail Avenger passes mail messages off to an arbitrary program you can
configure.  The default is sendmail -oi -os -oee -f SENDER --
RECIPIENT1 RECIPIENT2 ..., which works with both sendmail and qmail. 
I would imagine something similar should also work with postfix, exim,
and other mailers, though I haven't yet tried it myself.

David


Re: OT Boincing Spam

2004-12-25 Thread mazieres
I think people are missing an important point in this discussion about
bouncing spam.  Really, bouncing spam can be used to mean two
different things:

  1. Generate a bounce message to the envelope sender of the message, and

  2. During the SMTP session, refuse to accept mail from the client,
by returning a 500-series SMTP error code.

Option 1 is almost always a terrible idea, unless perhaps the sender
has published an SPF record and the result of an SPF check at the
server is pass (but definitely not anything else, including neutral or
none).  Anyway, option 1 is strictly inferior to option 2, as it will
always require more resources at the mail server.

Option 2 is actually in my opinion a good idea, because in the case of
false positives, it lets the sender know that the mail might not be
read.  In the case of actual spam, assuming you refuse the mail at the
outermost mail relay at your organization, very often the mail is
coming from a spambot that will never generate the bounce message.  In
other cases, the client may be an open mail relay, but such machines
are very often blacklisted anyway, so I don't view causing them to
send bounces as a terrible thing.  Others may disagree on that point,
but at any rate you are not risking getting your own server
blacklisted--only the open mail relay is in danger of being
blacklisted (which it should be anyway).

I've been quite interested in this issue of bouncing/refusing spam
messages, and so built an SMTP server that makes it easy for
individual users to refuse spam at the SMTP level.  (See
www.mailavenger.org for details.)

Recently, I have set up my account to reject with a 554 SMTP error
code anything that spamassassin flags as spam, using the default
threshold of 5.0, which is more aggressive than other people have been
suggesting here.  However, I also keep a copy of the messages I
bounce, both so as to monitor how this is working out, and to build a
corpus with which to train the Bayesian filter.  At least anecdotally,
this seems to be working well for me.  When I spot check spams, I
don't think I'm causing a lot of innocent people to get bounce
messages.

Note that I'm definitely sensitive to the issue of bad bounce
messages, as I used to receive a huge number of bounces for forged
messages--even though I publish strict SPF records.  These were mostly
bounced viruses, not spam, which meant that spamassassin didn't do a
great job of weeding them out.  However, I found a relatively simple
solution.  I now send all my mail from temporary envelope sender
addresses that expire after 21 days, and I refuse messages from the
empty envelope sender to my real (header From:) email addresses.  So
far so good, though I do realize there is the danger of a false
positive, some some people still send mail from the empty envelope
sender.

David


Re: OT Boincing Spam

2004-12-25 Thread Tim B
  1. Generate a bounce message to the envelope sender of the message, and
  2. During the SMTP session, refuse to accept mail from the client,
by returning a 500-series SMTP error code.
Option 1 is almost always a terrible idea, unless perhaps the sender
has published an SPF record and the result of an SPF check at the
server is pass (but definitely not anything else, including neutral or
none).  Anyway, option 1 is strictly inferior to option 2, as it will
always require more resources at the mail server.
Option 2 is actually in my opinion a good idea, because in the case of
false positives, it lets the sender know that the mail might not be
read.  In the case of actual spam, assuming you refuse the mail at the
outermost mail relay at your organization, very often the mail is
coming from a spambot that will never generate the bounce message.  In
other cases, the client may be an open mail relay, but such machines
are very often blacklisted anyway, so I don't view causing them to
send bounces as a terrible thing.  Others may disagree on that point,
but at any rate you are not risking getting your own server
blacklisted--only the open mail relay is in danger of being
blacklisted (which it should be anyway).
I've been quite interested in this issue of bouncing/refusing spam
messages, and so built an SMTP server that makes it easy for
individual users to refuse spam at the SMTP level.  (See
www.mailavenger.org for details.)
Recently, I have set up my account to reject with a 554 SMTP error
code anything that spamassassin flags as spam, using the default
threshold of 5.0, which is more aggressive than other people have been
suggesting here.  However, I also keep a copy of the messages I
bounce, both so as to monitor how this is working out, and to build a
corpus with which to train the Bayesian filter.  At least anecdotally,
this seems to be working well for me.  When I spot check spams, I
don't think I'm causing a lot of innocent people to get bounce
messages.
Well I've reached the point with those that bounce spam using Option 1 I 
 block with the following bounce:

554 Tell your admin to quit bouncing spam as that type of thing does 
nothing but DoS innocent domains.

Bouncing spam is IMHO just as big a problem as the spam itself.
It seems a certain appliance named after a fish likes to bounce spam by 
default which has caused our server to receive over 30,000 false bounces 
to legitimate email addresses in less an hour yesterday.

What I've do now is:
1) Spam over a certain score goes to /dev/null
2) Spam under a certain score, and over a certain score go to spamtrap 
incase someone's looking for something.
3) Low scoring spam gets delivered the user with **SPAM** in the subject 
 which the users have a client side rules to move those to a spam folder.

Viruses
1) Identifiable viruses go to /dev/null
2) Executeable's get quarantined in a filetrap


Re: OT Boincing Spam

2004-12-25 Thread Neylon:
Tim B wrote:
Bouncing spam is IMHO just as big a problem as the spam itself.
Agreed.
It seems a certain appliance named after a fish likes to bounce spam by 
default which has caused our server to receive over 30,000 false bounces 
to legitimate email addresses in less an hour yesterday.

Considering the CEO of that company is a reformed spammer this is 
hardly surprising

What I've do now is:
1) Spam over a certain score goes to /dev/null
2) Spam under a certain score, and over a certain score go to spamtrap 
incase someone's looking for something.
3) Low scoring spam gets delivered the user with **SPAM** in the subject 
 which the users have a client side rules to move those to a spam folder.
That seems sane. What levels do you set?


Re: OT Boincing Spam

2004-12-25 Thread John Andersen
On Friday 24 December 2004 06:59 pm, [EMAIL PROTECTED] wrote:
 Recently, I have set up my account to reject with a 554 SMTP error
 code anything that spamassassin flags as spam, using the default
 threshold of 5.0,

From your web page:

Bodytest support - allows you to run filters like spamassassin and clamscan 
on the body of a mail message before replying to the final . of the SMTP 
DATA command. (See the edinplace(1) man page and the bodytest description in 
the avenger(1) man page.) 


This would imply that you hold the connection open from the sender till
SA has had a look at the mail, (which may entail several network based hits
in the process of checking surbl etc).  Does this not entail some rather
large number of open connections on the mail server, some of which might
time out when SA is working hard?

Also does avenger sit ahead of sendmail or is it called by sendmail?
(Who is listening on 25? Avenger or sendmail/qumail?

-- 
_
John Andersen


pgpVXEujfgw7M.pgp
Description: signature


Re: OT Boincing Spam

2004-12-25 Thread Jay Plesset




Timeout should not be a problem.

My SA seems to take 3 to 6 seconds to scan a message. SMTP timeout
should be 10 minutes, for any server that's compliant with rfc.

jay

John Andersen wrote:

  On Friday 24 December 2004 06:59 pm, [EMAIL PROTECTED] wrote:
  
  
Recently, I have set up my account to reject with a 554 SMTP error
code anything that spamassassin flags as spam, using the default
threshold of 5.0,

  
  
>From your web page:

"Bodytest" support - allows you to run filters like spamassassin and clamscan 
on the body of a mail message before replying to the final "." of the SMTP 
DATA command. (See the edinplace(1) man page and the bodytest description in 
the avenger(1) man page.) 


This would imply that you hold the connection open from the sender till
SA has had a look at the mail, (which may entail several network based hits
in the process of checking surbl etc).  Does this not entail some rather
large number of open connections on the mail server, some of which might
time out when SA is working hard?

Also does avenger sit ahead of sendmail or is it called by sendmail?
(Who is listening on 25? Avenger or sendmail/qumail?

  





Re: OT Boincing Spam

2004-12-22 Thread ChupaCabra
Exactly.  I can show him excerpets of emails (which I already did) and 
it helps some.  An article on the internet , a howto I don't know about 
or an example of someone who did this and got blacklisted over the net 
would be best.  Maybe, like me, y'all have looked and not found anything 
suitable.

Lets hope this collection of emails appeases him some.
Thanks.
Chris Santerre wrote:
-Original Message-
From: ChupaCabra [mailto:[EMAIL PROTECTED]
First he wanted that.  I did it but actually kept em all.  So then his 
partner didn't get an urgent email so it was turned back to 
the users to 
decide.  I get a different kneejerk each week.  What fun 
dealing with an 
80 yo ex military man.  This am it was Lets spambomb every isp that 
sends spam  and maybe *they*  will do something about it.  And 
screw the 
rest of the world too.  America owns the internet.  Fsck Em, 
they would 
all die without the american economy, etc.
   

Boy you guys are all missing it. He needs to put it in terms his boss
understands. 

Tell him it is like hearing shots fired and putting surpressive fire on the
area without determining WHO is actually firing! 

He's looking at an internet courtmartial, for failing to act calm under
fire. 

--4 Star Major of antispam, Chris

 

--
Michael H. Collins  Admiral, Penguinista Navy
http://linuxlink.com
/\ASCII Ribbon Campaign
\ / No HTML/RTF in email
x   No Word docs in email
/ \ Respect for open standards
Take your laptop and yell out: 
Can a brother get a ip address?




Re: OT Boincing Spam

2004-12-21 Thread jdow
From: Evan Platt [EMAIL PROTECTED]

 ChupaCabra said:
  My boss is twisting off today because he got 350 messages marked [SPAM]
  over the weekend.  His Reaction is to Bounce em all, Let the isps sort
  it out.  I tried explaining about forged headers and the myriad of
  other methods spammers use to look like they come from someplace else.
  Apparantly he feels like I am blowing smoke.
 
 I don't have a link for you, but tell your boss to imagine if someone
 decided to dictionary attack every ISP they could find, using not only
 dictionary words, but every combination of letters up to 9 letters, i.e.
 a, b, c, etc up to z for every ISP they
 can find. And tell your boss that they intend to use HIS address as the
 reply-to address for the spam. Now ask him if he still thinks it's a good
 idea for ISP's to 'bounce' spam to this unintended victim - him.

Nice to fantasize about, Evan; but, doing so can truncate a budding
career woefully short.

If he uses procmail then he can toss all the spam above 10 points into
/dev/null. For the rest teach your boss how to setup a SPAM folder in
his email program. Then explain the false positive problem and how he
might lose customers that way. That might get him to cull through the
few 5.0 to 9. spams he'd receive. I am sure something equivalent
can be done with the spam stars with virtually any filter mechanism be
it milter, amavis, or whathaveyou.

Also, a note for the SARE folks:
There might be an alternate set of scores for the sexual related spams
that give them very high weights. These are things that do not belong in
most business environments. Let the employees be kinky at home.

{^_^}



Re: OT Boincing Spam

2004-12-21 Thread jdow
From: Evan Platt [EMAIL PROTECTED]

 Evan Platt said:
  I don't have a link for you, but tell your boss to imagine if someone
  decided to dictionary attack every ISP they could find, using not only
  dictionary words, but every combination of letters up to 9 letters, i.e.
  a, b, c, etc up to z for every ISP they
  can find. And tell your boss that they intend to use HIS address as the
  reply-to address for the spam. Now ask him if he still thinks it's a
good
  idea for ISP's to 'bounce' spam to this unintended victim - him.

 Let me follow up to myself (please allow myself to introduce... myself.) I
 posted a message to a yahoo group last week. A few minutes later, I get a
 e-mail that my message has been marked as Spam by some software, and if I
 wish to confirm my identity, I must click on a link to that companies web
 site (tracking numbers and all that in the URL). And, of course, this will
 add me to the persons allowed list so I won't have to do it again.
 Needless to say, I will NOT do that. This company could then sell its
 lists of CONFIRMED addresses for a goldmine.

 I then posted to the list, asked if anyone else had received this message,
 and a number of people did, and for the most part, no one clicked on the
 link. So now there's some 1d10t wondering why he's not getting any mail. I
 know this isn't your boss'es intention, but it sounds like he wants
 anything marked as spam deleted? Not a good idea, IMHO.
 (Baby, bathwater).

 Evan

I consign such tweebles to the bit bucket in procmail before they ever
get to SpamAssassin. I very seldom review that very slowly growing set
of rules. If someone reforms I'm still not interested in the critter.

{^_^}




Re: OT Boincing Spam

2004-12-21 Thread Jim Barry
So true.  If the boss wants to make an effort, then submit the spams to
spamcop -- or personally go to the upstream providers with individual
abuse complaints---

But attempting to bounce spam to likely bogus servers and users is futile,
with results about the same as him going outside and pissing into the
wind.




On Mon, December 20, 2004 8:34 pm, jdow said:
 Let your boss know that this policy he suggests WILL get him blocked
 at many sites permanently and spammers will find him such a convenient
 bounce spam relay that he'll end up on every blacklist in the world.




Re: OT Boincing Spam

2004-12-21 Thread Jeff Chan
On Monday, December 20, 2004, 12:49:59 PM, ChupaCabra ChupaCabra wrote:
 My boss is twisting off today because he got 350 messages marked [SPAM] 
 over the weekend.  His Reaction is to Bounce em all, Let the isps sort 
 it out.  I tried explaining about forged headers and the myriad of 
 other methods spammers use to look like they come from someplace else.  

Please don't bounce spams back to the (forged) senders.
All that does is create more noise, and it's considered
by most to be a poor practice.

If you're not already, consider using the RBL
sbl-xbl.spamhaus.org at the MTA level.  It's quite
safe and rejects a lot of spam before it's even seen
by SpamAssassin, etc.

What SpamAssassin or other anti-spam features are
you currently using?  SURBLs are quite effective
and pretty safe IMO.  :-)

Jeff C.
-- 
Jeff Chan
mailto:[EMAIL PROTECTED]
http://www.surbl.org/



RE: OT Boincing Spam

2004-12-21 Thread Michele Neylon :: Blacknight Solutions
 If you're not already, consider using the RBL
 sbl-xbl.spamhaus.org at the MTA level.  It's quite safe and
 rejects a lot of spam before it's even seen by SpamAssassin, etc.

I'd have to disagree with you Jeff.
A lot of the Irish and UK ISP netblocks end up in there as well, so you run
a higher risk of FPs if you are not careful.




Mr Michele Neylon
Blacknight Internet Solutions Ltd
Hosting, co-location  domains
http://www.blacknight.ie/
Tel. +353 59 9137101
http://www.blacknight.ie/specialoffers.html


-- 
Email scanned by Blacknight for viruses and dangerous content.
Visit http://www.blacknight.ie for more information



RE: OT Boincing Spam

2004-12-21 Thread Chris Santerre


-Original Message-
From: ChupaCabra [mailto:[EMAIL PROTECTED]
First he wanted that.  I did it but actually kept em all.  So then his 
partner didn't get an urgent email so it was turned back to 
the users to 
decide.  I get a different kneejerk each week.  What fun 
dealing with an 
80 yo ex military man.  This am it was Lets spambomb every isp that 
sends spam  and maybe *they*  will do something about it.  And 
screw the 
rest of the world too.  America owns the internet.  Fsck Em, 
they would 
all die without the american economy, etc.

Boy you guys are all missing it. He needs to put it in terms his boss
understands. 

Tell him it is like hearing shots fired and putting surpressive fire on the
area without determining WHO is actually firing! 

He's looking at an internet courtmartial, for failing to act calm under
fire. 

--4 Star Major of antispam, Chris





OT Boincing Spam

2004-12-20 Thread ChupaCabra
My boss is twisting off today because he got 350 messages marked [SPAM] 
over the weekend.  His Reaction is to Bounce em all, Let the isps sort 
it out.  I tried explaining about forged headers and the myriad of 
other methods spammers use to look like they come from someplace else.  
Apparantly he feels like I am blowing smoke.

Does anyone have some good links fo why it is not a good idea to bounce 
spam?  I am getting nowhere with my speil.  Untill he hears it from 
somewhere else I am in s--t city.

I can see where he gets the idea in that I still see people on the 
internets saying bouncing it is good but in all my readings I have 
learned better.  Or does anyone think bouncing all spam is a good idea.

Thanks ahead.
--
Michael H. Collins  Admiral, Penguinista Navy
http://linuxlink.com
/\ASCII Ribbon Campaign
\ / No HTML/RTF in email
x   No Word docs in email
/ \ Respect for open standards
Take your laptop and yell out: 
Can a brother get a ip address?




Re: OT Boincing Spam

2004-12-20 Thread Ralf Hildebrandt
* ChupaCabra [EMAIL PROTECTED]:
 My boss is twisting off today because he got 350 messages marked [SPAM] 
 over the weekend.  His Reaction is to Bounce em all, Let the isps sort 
 it out.  I tried explaining about forged headers and the myriad of 
 other methods spammers use to look like they come from someplace else.  
 Apparantly he feels like I am blowing smoke.
 
 Does anyone have some good links fo why it is not a good idea to bounce 
 spam?

Bounce where?

-- 
Ralf Hildebrandt (i.A. des IT-Zentrum)  [EMAIL PROTECTED]
Charite - Universitätsmedizin BerlinTel.  +49 (0)30-450 570-155
Gemeinsame Einrichtung von FU- und HU-BerlinFax.  +49 (0)30-450 570-962
IT-Zentrum Standort CBF send no mail to [EMAIL PROTECTED]


Re: OT Boincing Spam

2004-12-20 Thread Duncan Hill
On Monday 20 December 2004 20:49, ChupaCabra wrote:
 I can see where he gets the idea in that I still see people on the
 internets saying bouncing it is good but in all my readings I have
 learned better.  Or does anyone think bouncing all spam is a good idea.

Backscatter will get you blacklisted these days - there's enough junk mail on 
the net that backscatter doesn't help.

Crank up your SMTP rejections if you can - greylisting works quite well for 
the hit-and-run spammer who doesn't use a real SMTP server to send the spam.  
Add in things like 'don't say HELO with my IP or name, or with a reserved IP' 
and you're doing well.

Finally, look at using something like amavisd-new and quarantine mode - spam 
with a score  n gets quarantined instead of passed through.  There are 
commercial products that will do this, along with Maia MailGuard and a few 
others, including a plugin for squirrelmail.


Re: OT Boincing Spam

2004-12-20 Thread Mike
On Mon, 20 Dec 2004 14:49:59 -0600, ChupaCabra [EMAIL PROTECTED] wrote:
  Or does anyone think bouncing all spam is a good idea.
 
 Thanks ahead.
 
 --
 Michael H. Collins  Admiral, Penguinista Navy
 

Bouncing spam will do two things. First, it'll generate a lot of
useless traffic, which may or may not cost you money, but will
(slightly) increase the costs for everyone who's networks your bounces
transit.

The other thing it will do is queue up a lot of email in your outbound
MTA queue. A lot of spam is sent with completely bogus
usernames/domains/etc.., or is sent from domains that refuse
connections to their MX records. You'll spend a fair amount of time
purging invalid email out of your mail queue, which tends to be boring
:)

We did bounce spam for a while, but have since just let the end users
decide what to do with it. Ultimately, this is the best solution, as
what may be good for one person, may not be an option for another.
It's not hard to create a rule to delete all email heading to your
boss that is marked spam.

Mike


Re: OT Boincing Spam

2004-12-20 Thread ChupaCabra

Evan Platt wrote:
Evan Platt said:
 

I don't have a link for you, but tell your boss to imagine if someone
decided to dictionary attack every ISP they could find, using not only
dictionary words, but every combination of letters up to 9 letters, i.e.
a, b, c, etc up to z for every ISP they
can find. And tell your boss that they intend to use HIS address as the
reply-to address for the spam. Now ask him if he still thinks it's a good
idea for ISP's to 'bounce' spam to this unintended victim - him.
   

Let me follow up to myself (please allow myself to introduce... myself.) I
posted a message to a yahoo group last week. A few minutes later, I get a
e-mail that my message has been marked as Spam by some software, and if I
wish to confirm my identity, I must click on a link to that companies web
site (tracking numbers and all that in the URL). And, of course, this will
add me to the persons allowed list so I won't have to do it again.
Needless to say, I will NOT do that. This company could then sell its
lists of CONFIRMED addresses for a goldmine.
I then posted to the list, asked if anyone else had received this message,
and a number of people did, and for the most part, no one clicked on the
link. So now there's some 1d10t wondering why he's not getting any mail. I
know this isn't your boss'es intention, but it sounds like he wants
anything marked as spam deleted? Not a good idea, IMHO.
(Baby, bathwater).
Evan
 

First he wanted that.  I did it but actually kept em all.  So then his 
partner didn't get an urgent email so it was turned back to the users to 
decide.  I get a different kneejerk each week.  What fun dealing with an 
80 yo ex military man.  This am it was Lets spambomb every isp that 
sends spam  and maybe *they*  will do something about it.  And screw the 
rest of the world too.  America owns the internet.  Fsck Em, they would 
all die without the american economy, etc.

--
Michael H. Collins  Admiral, Penguinista Navy
http://linuxlink.com
/\ASCII Ribbon Campaign
\ / No HTML/RTF in email
x   No Word docs in email
/ \ Respect for open standards
Take your laptop and yell out: 
Can a brother get a ip address?




Re: OT Boincing Spam

2004-12-20 Thread ChupaCabra

shane mullins wrote:
Could you just discard it?
 

I was till a couple of vips lost important email.  I was actually 
keeping it all because I knew better.

 



RE: OT Boincing Spam

2004-12-20 Thread Ring, John C
My boss is twisting off today because he got 350 messages marked [SPAM] 
over the weekend.  His Reaction is to Bounce em all, Let the isps sort 
it out.

And then when a spammer sends tons of e-mail to your site forged as, say,
[EMAIL PROTECTED], you stand a good chance IBM may end up blocking all
email from your site, at least for a while.

Also, check the terms of service with your ISP.  I suppose it is possible
they might consider such a configuration as abusive, and could use it as
grounds to terminate your service.  Plenty of people are savvy enough to
report spam to the ISP of the sender.  (In this case, you would in effect be
that sender.)

What you want to do, IMO, is run SpamAssassin during the SMTP session, such
as with http://duncanthrax.net/exiscan-acl/.  Then reject messages with a
very high score, but simply label and deliver messages for a lower spam
score.  For example, reject mail scoring 15 or higher, mark and deliver if 5
or over, and classify as ham if the score is below 5.

Other MTAs provide other ways of doing this as well.



-- 
John C. Ring, Jr. 
[EMAIL PROTECTED] 
Network Engineer
Union Switch  Signal Inc.

If all mankind minus one, were of one opinion,  only one person of the
contrary opinion, mankind would be no more justified in silencing that one
person, than he, if he had the power, would be justified in silencing
mankind -- John Stuart Mill


Re: OT Boincing Spam

2004-12-20 Thread Evan Platt
ChupaCabra said:
 First he wanted that.  I did it but actually kept em all.  So then his
 partner didn't get an urgent email so it was turned back to the users to
 decide.  I get a different kneejerk each week.  What fun dealing with an
 80 yo ex military man.  This am it was Lets spambomb every isp that
 sends spam  and maybe *they*  will do something about it.  And screw the
 rest of the world too.  America owns the internet.  Fsck Em, they would
 all die without the american economy, etc.

Perhaps he doesn't understand the thinking behind let's spambomb every
ISP that sends spam

Back to my second Joe-Job example.
For example, let's say I'm connected with a dial up account in China. I
spoof all headers to indicate my spam comes from [EMAIL PROTECTED] . Who
gets the bounce messages, ChinaSpamHaven.hk , or [EMAIL PROTECTED] / aol.com
?