On Sun, Jun 9, 2013 at 5:08 AM, Todd Lyons <[email protected]> wrote:
> > Even better: accept that 1%, store that info, and then wait for IP's > to connect using that username and password combination (and either > reject it or blackhole it, your choice) and use long delays for > systems that connect with that user/pass combo. > > The resulting data will tie together methods/sources of password > cracking with the exploited systems that try to abuse it. As long as the list is purged once in a while, that should work okay. -- Jan -- ## List details at https://lists.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://wiki.exim.org/
