begin quoting John H. Robinson, IV as of Wed, May 18, 2005 at 11:21:38PM -0700: > Stewart Stremler wrote: [snip] > This is pretty easy for a mindless smtp server to get around: send out > the spam; send the same one out again in (say) six hours. If the > unique tokens are hashed through the target address, it is a simple > matter to go through the list twice. If the mail goes through twice, so > much the better!
Open relays are generally considered a Bad Thing. And if you link into an RBL, hopefully the IP of the mindless smtp server can end up in the RBL in six hours. > I'm not actually interested in writing the code to test this theory. Plenty of real-world sources of spam out there already. -Stewart "Why simulate spam when the real thing is close at hand?" Stremler
pgpoPyZ86MEjA.pgp
Description: PGP signature
-- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
