On Sun, Jun 9, 2013 at 5:08 AM, Todd Lyons <[email protected]> wrote:

>
> Even better: accept that 1%, store that info, and then wait for IP's
> to connect using that username and password combination (and either
> reject it or blackhole it, your choice) and use long delays for
> systems that connect with that user/pass combo.
>
> The resulting data will tie together methods/sources of password
> cracking with the exploited systems that try to abuse it.


As long as the list is purged once in a while, that should work okay.

-- 
Jan
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to