Using something like this would be great, if all of the users used webmail
or IMAP on their clients... Unfortunately, most of mine either use POP3 or
I'm simply filtering their e-mail, so there's not really any folders to
search through...

I've often toyed with the spamtrap honeypot idea, using it to feed a private
DNS based rbl... I've also thought of doing a whitelist (I guess you could
call it a RWL :-)  )...  I don't, however, trust my users to submit "Spam"
and use that as a basis for determining what is/isn't spam.

My thought was to use a commonly spammed account that isn't valid on my
domain, like "webmaster", or "admin", etc.  Anyone sending e-mail to those
addresses, on my domain, is spamming.  Anything coming to those addresses
should be blocked, even if it's only for a period of time...  If I look at
the spam  runs that I occasionally get, most are random addresses that I
don't think you would see much benefit from something like this.  However, I
do occasionally get a run where people are using *REALLY* old e-mail
addresses that haven't been active in years.  Those are spammers.  Catching
them early in their run would prevent valid users from getting their spam...

As was suggested, perhaps SpamDyke isn't the best place to "Create" the
blacklist, but using a .qmail file would be...And then utilize SpamDyke's
existing features to query the RBL...

Mike

-----Original Message-----
From: spamdyke-users-boun...@spamdyke.org
[mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Sam Clippinger
Sent: Wednesday, June 22, 2011 9:12 AM
To: spamdyke users
Subject: Re: [spamdyke-users] Spamtrap-like setup

>From a technical standpoint, it shouldn't be too hard to implement.  When
triggered, the spamtrap filter would just set the CHILD_QUIT flag in
smtp_filter(), which would cause middleman() to close its connection to
qmail (so no more commands would be sent to the real mail server).  Each
filter is implemented in its own function and contains the logic to honor
the whitelists/authentication -- it would be simple to omit this code for a
spamtrap filter.

I'm not sure how much actual spam this kind of thing would stop, however.
It would rely on the incoming spam being sent in a batch, which doesn't
always happen, and with a spamtrap address included, which could be unlikely
if you have a lot of users on your server or if you're using the
max-recipients filter.  But more importantly, it would rely on the spammers
scraping your website and starting to send spam to your spamtrap addresses,
which could take quite some time to happen.  On my own server, I get a lot
more spam sent to random/guessed addresses in my domains than to actual
addresses that are published online.

Overall, I'm not sure I see the difference between running this kind of
filter and just using a public blacklist like SORBS (which uses spamtraps to
create the blacklist).

I actually have a script running on my server that does basically this kind
of auto-blacklisting (no, not the one we discussed a couple weeks ago but
another one).  It works like this: it goes through all of my users'
mailboxes and parses the mail headers for recent messages to find the IP
addresses of the remote sending server.  It breaks those into three lists:
IPs from messages found in "Junk" folders, IPs from messages delivered to
spamtraps and IPs from messages in any other folder ("Trash" folders are
ignored).  If an address occurs 3 or more times in a "Junk" folder OR once
in a spamtrap mailbox, it's blacklisted.  If it occurs even once anywhere
else, it is removed from the blacklist.  My users are pretty good about
clicking "Junk" on their spam, so this script essentially crowdsources the
blacklisting logic.  On my server, which admittedly hosts a relatively small
number of users, it typically keeps about 30 IPs on the blacklist at any
given time.

I like this setup because it runs offline at a low priority.  Because it
looks at received email, it doesn't matter if the messages were delivered in
batch/encrypted/whatever.  Modifying the script to only look at the spamtrap
mailboxes would be trivial.

-- Sam Clippinger

On Jun 22, 2011, at 10:27 AM, Dossy Shiobara wrote:

> Angus,
> 
> Indeed, the support for spamtrap addresses in Spamdyke could be 
> interesting - my design for such a feature would be a variation on the 
> recipient blacklist.
> 
> A list of "spamtrap-entry" addresses, if seen as an RCPT TO, will cause 
> the message to be rejected at the "DATA" step.  It is NOT wise to reject 
> the individual RCPT TO, which I understand is how the current 
> recipient-blacklist works -- spammers could just use that feedback to 
> clean their lists.  Instead, silently accept the spamtrapped RCPT TO, 
> but reject the whole message attempt once the SMTP client tries to enter 
> the DATA phase of the exchange.
> 
> The spamtrap handling can't be implemented like another form of 
> blacklist because Spamdyke currently tests whitelists before blacklists, 
> but this spamtrap handling would have to be done separately from the 
> filtering entirely.  Otherwise, a whitelisted sender (Gmail, etc.) would 
> defeat the spamtrap.  The idea is basically, "If the message includes 
> any spamtrap recipient, no matter what other filters exist, refuse to 
> accept the message."
> 
> Thoughts?  I could probably work up a patch against the latest Spamdyke, 
> since I'm getting quite familiar with the code ...
> 
> 
> On 6/22/11 10:47 AM, Angus McIntyre wrote:
>>> I'd recommend AGAINST using the sender email address as it could result
>>>> in a denial of service if someone simply forges a legitimate email
>>>> address as the sender address.
>> Pretty much any automated blacklisting is fraught with problems, for
>> exactly this reason.
>> 
>> Rather than auto-blacklisting, you might use the presence of one of your
>> spamtrap addresses among the recipients of a message as evidence that the
>> message is spam. Spammers often 'batch' messages, so that their message
is
>> sent to several addresses at the same domain in a single transaction. If
>> one of the targeted addresses is only known to spammers, you can dump the
>> whole message.
>> 
>> I suggested this as a feature of Spamdyke a while back and Sam said that
>> he might consider adding it in future. I don't know if there's any
interim
>> way of implementing this strategy using other tools.
> 
> -- 
> Dossy Shiobara         |      "He realized the fastest way to change
> do...@panoptic.com     |   is to laugh at your own folly -- then you
> http://panoptic.com/   |   can let go and quickly move on." (p. 70)
>   * WordPress * jQuery * MySQL * Security * Business Continuity *
> 
> _______________________________________________
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users

_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to