On Thu, 18 May 2006, Marc Perkel wrote: > > I'm glad it helps you, but for the folks[1] with domains that > > are heavily forged by spammers, the callbacks themselves are > > a additional DoS they have to deal with. > > > > [1] not me, but others I know. > > > > Not if it's done right. Exim caches results avoiding repeated calls. And > I do a trick with dictionary attacks where I will return a DEFER on an > IP address for a 5 minute period if they commit certian sins that get > their IP on my 5 minute defer lists. >
(no cc needed, thanks) I'm not saying don't do callbacks, but while your idea isn't a bad one, it may not help much when you're dealing with a spammer with thousands of compromised boxes they're sending through. For smallish receivers doing the callbacks, this really isn't that big a deal (at least imho). The case I'm thinking about was one large provider's setup beating up a domain that had literally a handful of legit Rcpt_Tos. -- -------------------------------------------------------- Dave Lugo [EMAIL PROTECTED] LC Unit #260 TINLC Have you hugged your firewall today? No spam, thanks. -------------------------------------------------------- Are you the police? . . . . No ma'am, we're sysadmins. -- ## List details at http://www.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://www.exim.org/eximwiki/
