On Thu, Jun 30, 2016 at 02:19:20AM +0000, Michael Wise via mailop wrote:
> This ... is an attack for which I have become rather familiar.

As have I.  Various countermeasures deployed singly and in combination
have sufficed to cut it down to a dull roar, but the distributed nature
of the attack renders it difficult (if not impossible) to stop entirely.

Here's a list.  Some of these will (obviously) not work for everyone;
some of them may not work for anyone.

1. Don't allow list signups via the web.  Given that -request has
been a standard for decades, every person attemping to sign up for
every mailing list should know it.  If not, they should learn.  If
they're not capable of learning, too bad.

2. Block traffic from problematic regions/countries or allow traffic
from desired regions/countries.  For mailing lists whose interest
is confined to a geographic area, this works pretty well.  For
those which aren't, nope.

3. Throttle outbound subscription confirmations.  Correlate with
originating domains/usernames/IP addresses/etc.  At small scale
this doesn't work too well, but at medium and large scales the
accumulated patterns of abuse tend to leap off the screen.

4. Perform daily log analysis.  Spikes in subscription rates
*may* reveal abuse-in-progress -- probably not, but it's worth
the perfunctory exercise just in case.  Of course this is
after-the-fact and the damage may already be done.

5. There are a lot of worthless (new) TLDs.  "Use a real domain"
is quickly becoming a valid response to requests from them.

---rsk

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to