Re: Breaking up the Bot army - we need a plan

2006-12-14 Thread Kevin Golding
In article [EMAIL PROTECTED], John Rudd [EMAIL PROTECTED] writes I'm _highly_ skeptical that emailebay.com has anything to do with ebay.com. Registrant: eBay Inc. 2145 Hamilton Avenue San Jose, CA 95125 US Domain name: EMAILEBAY.COM Registrar of Record: TUCOWS, INC. Record last updated

RE: Breaking up the Bot army - we need a plan

2006-12-14 Thread R Lists06
You didn't read what I actually said. I didn't say the domain didn't look right. I said the IP address registration didn't look right. nslookup ebay.com Name: ebay.com Address: 66.135.192.87 whois 66.135.192.87 OrgName:eBay, Inc OrgID: EBAY Address:

Re: Breaking up the Bot army - we need a plan

2006-12-14 Thread John Rudd
R Lists06 wrote: Looks quite a bit different to me. Not really Do a dig -x 216.33.156.118 then do a dig -x 216.33.157.1 notice my simple change and see that it appears that it just hasn't been swip'd yet I'm not sure what your point is. Yes, the latter tells you that the PTR

Re: Breaking up the Bot army - we need a plan

2006-12-14 Thread Kevin Golding
Someone, quite probably John Rudd, once wrote: Kevin Golding wrote: In article [EMAIL PROTECTED], John Rudd [EMAIL PROTECTED] writes I'm _highly_ skeptical that emailebay.com has anything to do with ebay.com. Registrant: eBay Inc. 2145 Hamilton Avenue San Jose, CA 95125 US Domain

RE: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-13 Thread Michele Neylon :: Blacknight
Maybe they're better suited to one of the other lists such as spam-l? Mr Michele Neylon Blacknight Solutions Hosting Colocation, Brand Protection http://www.blacknight.ie/ http://blog.blacknight.ie/ Tel. 1850 927 280 Intl. +353 (0) 59 9183072 UK: 0870 163 0607 Direct Dial: +353 (0)59 9183090

Re: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-13 Thread Andreas Pettersson
Michele Neylon :: Blacknight wrote: Maybe they're better suited to one of the other lists such as spam-l? May I suggest news.admin.net-abuse.email -- Andreas

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread JamesDR
Phil Barnett wrote: On Tuesday 12 December 2006 07:28, JamesDR wrote: There is nothing in SPF to keep a spammer with a botnet from putting 0.0.0.0/0 as their approved domain limit. Sounds like a good spam sign to me. Let the spammers put 0.0.0.0/0 in their spf records, I'll pop in 3 points for

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread James Davis
JamesDR wrote: Even better. If they give me a giant subnet of SPF records, I know exactly what IP's I don't want connecting to my mail server. If a spammer sends a spam from a subnet, passes SPF. I will and have gone, looked at their record and blocked what they say is 'allowed' to send me

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread JamesDR
James Davis wrote: JamesDR wrote: Even better. If they give me a giant subnet of SPF records, I know exactly what IP's I don't want connecting to my mail server. If a spammer sends a spam from a subnet, passes SPF. I will and have gone, looked at their record and blocked what they say is

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread Theo Van Dinter
On Wed, Dec 13, 2006 at 10:43:40AM -0500, JamesDR wrote: accept the mail from forged addresses, I don't know. I'm making the point that -- if a spammer says hey, these bots are allowed to send spam for my domain then you know right away who to block. Even if it is The issue is that SPF only

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread DAve
JamesDR wrote: Phil Barnett wrote: On Tuesday 12 December 2006 07:28, JamesDR wrote: There is nothing in SPF to keep a spammer with a botnet from putting 0.0.0.0/0 as their approved domain limit. Sounds like a good spam sign to me. Let the spammers put 0.0.0.0/0 in their spf records, I'll pop

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread John D. Hardin
On Wed, 13 Dec 2006, JamesDR wrote: Bot masters can easily set up SPF addresses that will encompass giant subnets of bots. You'll never know where to draw the line. Even better. If they give me a giant subnet of SPF records, I know exactly what IP's I don't want connecting to my mail

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread JamesDR
John D. Hardin wrote: What if they include the subnet containing AOL's outbound MX hosts? Waitaminit, bad example... :-D What if they include the subnet containing Apache's outbound MX hosts? As I said before, score on the total number of the hosts matched by the SPF record. Anything

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread Steve Lake
Well, I have a simple plan. Spammers are inherently greedy, right? Why not offer a $25k-$25mil a head bounty on any spammer captured and brought to justice? Even if we can't convict them on crimes of spamming, we can certainly get them on fraud and other things. There's plenty of

Re: Breaking up the Bot army - we need a plan

2006-12-13 Thread John Rudd
Duncan Hill wrote: On Monday 11 December 2006 16:16, John Rudd wrote: Duncan Hill wrote: I just finished a very quick test of the Botnet tool, and the sheer number of FPs against eBy mail coming from eBay's servers was staggering - literally every single mail from eBay. It also, for my

Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread Dhawal Doshy
Steve Thomas wrote: Once again, Perkel clutters the SpamAssassin list with a non-SpamAssassin discussion. One which, IIRC, he's just rehashing from a year or so ago (are we going to see a rehash of the the future of email storage is sql thread, too?). There are FAR more appropriate forums for

Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread Rob McEwen
Steve Thomas wrote: Once again, Perkel clutters the SpamAssassin list with a non-SpamAssassin discussion. ...Is anyone else getting tired of this? ...have nothing to do with SA. What's the point of having a topical mailing list if nobody cares that the discussion is off-topic? Dhawal wrote:

Re: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread Jeff Chan
On Tuesday, December 12, 2006, 12:29:26 AM, Rob McEwen wrote: It is just these types of discussions which led to things like SURBL and fuzzyOCR. In the interests of preserving some history, SURBLs were not created as a result of discussions here. We created SURBLs concurrently with Eric Kolve

Re: Breaking up the Bot army - we need a plan

2006-12-12 Thread JamesDR
Phil Barnett wrote: On Monday 11 December 2006 16:50, JamesDR wrote: Would you care to elaborate on why SPF doesn't work for sender verification? Its pretty simple, doesn't get much more simple that what SPF does... If SPF doesn't work, nothing will. There is nothing in SPF to keep a spammer

RE: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread Rob McEwen
[mailto:[EMAIL PROTECTED] Sent: Tuesday, December 12, 2006 6:49 AM To: Rob McEwen Cc: users@spamassassin.apache.org Subject: Re: Filtering THIS list (Re: Breaking up the Bot army - we need a plan) On Tuesday, December 12, 2006, 12:29:26 AM, Rob McEwen wrote: It is just these types of discussions

Re: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread Dhawal Doshy
Jeff Chan wrote: On Tuesday, December 12, 2006, 12:29:26 AM, Rob McEwen wrote: It is just these types of discussions which led to things like SURBL and fuzzyOCR. In the interests of preserving some history, SURBLs were not created as a result of discussions here. We created SURBLs

RE: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread Rob McEwen
Dhawal said: Also from my limited memory, a fuzzyocr like implementation existed on antispan.imp.ch long before it was discussed on the sa-users list. Someone can correct me if this is incorrect information. And, like SURBL, regardless of the official origin of the idea, I know for a fact that

Re: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread Dhawal Doshy
Rob McEwen wrote: Dhawal said: Also from my limited memory, a fuzzyocr like implementation existed on antispan.imp.ch long before it was discussed on the sa-users list. Someone can correct me if this is incorrect information. And, like SURBL, regardless of the official origin of the idea, I

Re: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread John Rudd
Rob McEwen wrote: Steve Thomas wrote: Once again, Perkel clutters the SpamAssassin list with a non-SpamAssassin discussion. ...Is anyone else getting tired of this? ...have nothing to do with SA. What's the point of having a topical mailing list if nobody cares that the discussion is

Re: Breaking up the Bot army - we need a plan

2006-12-12 Thread John Rudd
JamesDR wrote: Phil Barnett wrote: On Monday 11 December 2006 16:50, JamesDR wrote: Would you care to elaborate on why SPF doesn't work for sender verification? Its pretty simple, doesn't get much more simple that what SPF does... If SPF doesn't work, nothing will. There is nothing in SPF

Re: Breaking up the Bot army - we need a plan

2006-12-12 Thread Phil Barnett
On Tuesday 12 December 2006 07:28, JamesDR wrote: There is nothing in SPF to keep a spammer with a botnet from putting 0.0.0.0/0 as their approved domain limit. Sounds like a good spam sign to me. Let the spammers put 0.0.0.0/0 in their spf records, I'll pop in 3 points for good measure.

Re: Filtering THIS list (Re: Breaking up the Bot army - we need a plan)

2006-12-12 Thread Jeff Chan
On Tuesday, December 12, 2006, 5:52:33 AM, Dhawal Doshy wrote: I am not against off-topic discussions (and also indulge in a few when appropriate), what i am tired of is 'Perkel', have a look at some of the threads started by him.. Breaking up the Bot army - we need a plan Who wants my spam

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread Duncan, Brian M.
-Original Message- From: Marc Perkel [mailto:[EMAIL PROTECTED] Sent: Monday, December 11, 2006 8:49 AM To: users@spamassassin.apache.org Subject: Breaking up the Bot army - we need a plan We can talk about other things but I'll stop here to focus on the bot army. I think you

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Duncan Hill
On Monday 11 December 2006 15:57, Duncan, Brian M. wrote: ISP's client address). The places I've been using it, and the people I hear about who are using it, have seen a high degree of success. It can be downloaded from: http://people.ucsc.edu/~jrudd/spamassassin/Botnet.tar I just

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
Duncan Hill wrote: On Monday 11 December 2006 15:57, Duncan, Brian M. wrote: ISP's client address). The places I've been using it, and the people I hear about who are using it, have seen a high degree of success. It can be downloaded from:

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, Duncan, Brian M. wrote: From: Marc Perkel [mailto:[EMAIL PROTECTED] We can talk about other things but I'll stop here to focus on the bot army. I think you are preaching to the wrong crowd. If you want to help lower your Spam from botnets look into the botnet

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Duncan Hill
On Monday 11 December 2006 16:16, John Rudd wrote: Duncan Hill wrote: I just finished a very quick test of the Botnet tool, and the sheer number of FPs against eBy mail coming from eBay's servers was staggering - literally every single mail from eBay. It also, for my testing, hit on a

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread Duncan, Brian M.
Again I think you are preaching to the wrong crowd. No offense meant. Please distinguish between filtering spam (a solution that keeps spam out of your mailbox) and changing the protocols and/or ISP behavior to make spamming more difficult (a solution which keeps spam off the wire in the

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
Duncan Hill wrote: On Monday 11 December 2006 16:16, John Rudd wrote: Duncan Hill wrote: I just finished a very quick test of the Botnet tool, and the sheer number of FPs against eBy mail coming from eBay's servers was staggering - literally every single mail from eBay. It also, for my

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Robert LeBlanc
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Marc Perkel wrote: How do we isolate end users so that they can't get viruses as easily and spread them as easily? That would seem to be the job of filters, either upstream from the end-users or installed on their computers. Upstream solutions

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Matthias Keller
John Rudd wrote: Marc Perkel wrote: I'm someone who works from home and provides so service from home. So I would not want to be prohibited from running an email server from home. But if I had to got to a web panel that my ISP provided to open up ports that would be fine with me. I'm

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread Giampaolo Tomassoni
From: John Rudd [mailto:[EMAIL PROTECTED] Marc Perkel wrote: I'm someone who works from home and provides so service from home. So I would not want to be prohibited from running an email server from home. But if I had to got to a web panel that my ISP provided to open up ports that

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
Matthias Keller wrote: John Rudd wrote: Marc Perkel wrote: I'm someone who works from home and provides so service from home. So I would not want to be prohibited from running an email server from home. But if I had to got to a web panel that my ISP provided to open up ports that would be

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Robert LeBlanc
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Matthias Keller wrote: And just closing port 25 outgoing wont help for long as spammers just switch to submission port Yes, but the point of using a submission port to segregate the traffic channels is not to obfuscate things for spammers, it's to

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, John Rudd wrote: Marc Perkel wrote: I'm someone who works from home and provides so service from home. So I would not want to be prohibited from running an email server from home. But if I had to got to a web panel that my ISP provided to open up ports that would

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, Matthias Keller wrote: I'm curious.. as someone who ALSO runs a home mail server... What's wrong with evolving best practices to require that our outgoing email be channeled through our ISP's mail server, instead of having our customer-assigned IP addresses

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Daryl C. W. O'Shea
Robert LeBlanc wrote: Connections arriving on port 25 can be assumed to come from servers with MX records, so that becomes a testable assumption and a precondition for connection. Since when? If I rejected mail on that condition I would never have received your message. Daryl

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Matthias Keller
John D. Hardin wrote: On Mon, 11 Dec 2006, Matthias Keller wrote: I'm curious.. as someone who ALSO runs a home mail server... What's wrong with evolving best practices to require that our outgoing email be channeled through our ISP's mail server, instead of having our customer-assigned

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
John D. Hardin wrote: On Mon, 11 Dec 2006, John Rudd wrote: Marc Perkel wrote: I'm someone who works from home and provides so service from home. So I would not want to be prohibited from running an email server from home. But if I had to got to a web panel that my ISP provided to open up

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Robert LeBlanc
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Daryl C. W. O'Shea wrote: Robert LeBlanc wrote: Connections arriving on port 25 can be assumed to come from servers with MX records, so that becomes a testable assumption and a precondition for connection. Since when? If I rejected mail on

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
Robert LeBlanc wrote: Connections arriving on port 25 can be assumed to come from servers with MX records, so that becomes a testable assumption and a precondition for connection. There are two things that are wrong with that statement. 1) MX records are a good idea, not an absolute

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
Matthias Keller wrote: John D. Hardin wrote: On Mon, 11 Dec 2006, Matthias Keller wrote: I'm curious.. as someone who ALSO runs a home mail server... What's wrong with evolving best practices to require that our outgoing email be channeled through our ISP's mail server, instead of having

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread hamann . w
so what is wrong with a MTA that - checks helo and just takes a note - accepts smtp auth, if provided (and erases bad notes from the helo in that case) - accepts an optional second helo after the auth and discards it - accepts mail from and rcpt to ... and at the first rcpt to issues a 5xx if the

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Daryl C. W. O'Shea
Robert LeBlanc wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Daryl C. W. O'Shea wrote: Robert LeBlanc wrote: Connections arriving on port 25 can be assumed to come from servers with MX records, so that becomes a testable assumption and a precondition for connection. Since when? If I

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Robert LeBlanc
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 John Rudd wrote: Robert LeBlanc wrote: Connections arriving on port 25 can be assumed to come from servers with MX records, so that becomes a testable assumption and a precondition for connection. There are two things that are wrong with that

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Robert LeBlanc
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Daryl C. W. O'Shea wrote: You said that if you're only expecting mail from non-local domains (MX-to-MX) on port 25 you can reject hosts if they don't have an MX record. That's not true and that's what I said. As I conceded in another post a few

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread JamesDR
Robert LeBlanc wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 John Rudd wrote: Robert LeBlanc wrote: Connections arriving on port 25 can be assumed to come from servers with MX records, so that becomes a testable assumption and a precondition for connection. There are two things that

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
JamesDR wrote: SPF already does this poorly. We need something that actually works.

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread Bowie Bailey
Robert LeBlanc wrote: My mistake, then; thanks for the clarification. I suppose what we need, then, is something like a TX record for helping to identify outbound mail servers. That already exists. It's called SPF. -- Bowie

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread Bowie Bailey
John Rudd wrote: JamesDR wrote: SPF already does this poorly. We need something that actually works. And what would you do differently? An SPF record is basically just a list of valid mail servers for a domain plus a bit of information about how strict the domain wants to be

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, Matthias Keller wrote: John D. Hardin wrote: On Mon, 11 Dec 2006, Matthias Keller wrote: And forcing users to use their ISP's mail server efficively defeats SPF How so? I'm assuming a home business owner owns and uses their own domain and has the ability

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, John Rudd wrote: Think open relay. The ISP mailserver should only be accepting mail *from* their domain or *to* their domain. Mail from and to domains they don't own should be blocked. I think you're mis-stating this. 1) Being an open relay isn't about accepting

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, Robert LeBlanc wrote: My mistake, then; thanks for the clarification. I suppose what we need, then, is something like a TX record for helping to identify outbound mail servers. SPF -- John Hardin KA7OHZhttp://www.impsec.org/~jhardin/ [EMAIL

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, Marc Perkel wrote: All outgoing email from consumers should by default be required to use authenticated SMTP or some new authenticated protocol. Unfortunately this is defeated by a Remember this password? option in the mail client. A bot can easily retrieve the

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread JamesDR
John Rudd wrote: JamesDR wrote: SPF already does this poorly. We need something that actually works. Would you care to elaborate on why SPF doesn't work for sender verification? Its pretty simple, doesn't get much more simple that what SPF does... If SPF doesn't work, nothing

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
John D. Hardin wrote: On Mon, 11 Dec 2006, Marc Perkel wrote: All outgoing email from consumers should by default be required to use authenticated SMTP or some new authenticated protocol. Unfortunately this is defeated by a Remember this password? option in the mail client. A bot can easily

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread JamesDR
Matthias Keller wrote: John D. Hardin wrote: On Mon, 11 Dec 2006, Matthias Keller wrote: I'm curious.. as someone who ALSO runs a home mail server... What's wrong with evolving best practices to require that our outgoing email be channeled through our ISP's mail server, instead of having

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
JamesDR wrote: John Rudd wrote: JamesDR wrote: SPF already does this poorly. We need something that actually works. Would you care to elaborate on why SPF doesn't work for sender verification? Its pretty simple, doesn't get much more simple that what SPF does... If SPF doesn't

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, John Rudd wrote: I look up the SPF record for foo.com. It says: +all ...so the SPF spec has some holes that permit abuse. Tighten the spec my prohibiting +all and +0.0.0.0/1 +8.0.0.0/1 and similar nonsense, and/or modify SPF client implementations to place an upper limit

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread Bret Miller
In my above example, SPF did nothing useful. And, my example shows exactly why SPF does not help at all with the spambot problem. If I'm a spambot wrangler, I create a group of throw-away domains, put in SPF records for them that say +all, and then send out my storm of spam. Then I

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread Karl Auer
On Mon, 2006-12-11 at 14:41 -0800, Bret Miller wrote: took me almost 2 months to get all the issues straightened out after we moved and changed ISPs. Everything's an extra cost option. But I have a nice list now, so next time they all get negotiated as included before we sign the contract.

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread John Rudd
John D. Hardin wrote: This doesn't mean SPF is crap. As SPF currently exists, it is crap.

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Phil Barnett
On Monday 11 December 2006 16:50, JamesDR wrote: Would you care to elaborate on why SPF doesn't work for sender verification? Its pretty simple, doesn't get much more simple that what SPF does... If SPF doesn't work, nothing will. There is nothing in SPF to keep a spammer with a botnet from

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread John D. Hardin
On Mon, 11 Dec 2006, Bret Miller wrote: OTOH, I can see where a spammer could easily register a bunch of domains, and then update the SPF records to include the specific spambots that are delivering e-mail from each domain. That's not a problem. That means you can with high confidence toss

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Mark Nienberg
John Rudd wrote: a) if you're big, have reverse DNS that works, looks like a server, and doesn't look like a client (ie. the things Botnet looks for). b) if you're small: i) try to get your ISP to do the right thing (above) with your reverse DNS, or ii) get a hosted service that does

RE: Breaking up the Bot army - we need a plan

2006-12-11 Thread Giampaolo Tomassoni
From: news [mailto:[EMAIL PROTECTED] Behalf Of Mark Nienberg I think the false positives are coming almost entirely from small businesses running an in-house exchange server. I also think that a lot of them use a filtering service like postini in front of their exchange machine,

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Steve Thomas
Once again, Perkel clutters the SpamAssassin list with a non-SpamAssassin discussion. One which, IIRC, he's just rehashing from a year or so ago (are we going to see a rehash of the the future of email storage is sql thread, too?). There are FAR more appropriate forums for these non-SA related

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Mathias Homann
Am Montag, 11. Dezember 2006 23:41 schrieb Bret Miller: So perhaps SPF should consider removing +all as an option. Realisticly anyone that has to say my e-mail might come from anywhere is contributing to the problem and probably deserves to have e-mail bounced. sounds like a possible SA

Re: Breaking up the Bot army - we need a plan

2006-12-11 Thread Mathias Homann
Am Dienstag, 12. Dezember 2006 05:09 schrieb Steve Thomas: Is anyone else getting tired of this? Forty eight messages on the SA list today that have nothing to do with SA. What's the point of having a topical mailing list if nobody cares that the discussion is off-topic? if you're so opposed