On Fri, 2002-10-11 at 01:28, Carl E. Mankinen wrote:
> With all this talk of SA stalling, I decided to go ahead and post an idea
> that a friend of mine posed to me a couple days ago. I don't think he is
> interested in posting to the list, but he hates spam as much as I do.
> 
> The idea is to do something like the "CodeRed" tarpit (labrea, heh) did for
> infected IIS servers, but instead use the technique to slow down MTA's that
> are being used to deliver spam.
> 
> It would be trivial to modify spamassassin on a high score spam email, to
> hand off the address of the offender to a tarpit daemon.
> 
> So if your MTA receives some spam, start sending half open tcp session
> requests to the spam source/openrelay and slow it down. If a spammer hits
> enough tarpits, then it would have the effect of totally DoS'ing the relay
> he is using. I know that some of you will say this is a big legal risk, but
> I wonder...
> 
> What if you changed your 220 line to say "By connecting you agree to legal
> terms at http://blahblah"; ?
> Would that be sufficient to prevent legal issues? (I am sure some company
> will get pissed their mail server stopped working, and rather hire attornies
> instead of geeks to fix the problem.)
> 
> Has anyone done anything like this yet? or has the idea been shotdown?
> 

I though qmail had/has something like this already. It's based on
blackhole lists. It's covered in detail in the qmail handbook, which I
conveniently left home today.
 




-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to