Paul Murphy wrote:
I'd also be interested in implementing a block based on address range check, so
perhaps if more than 10 SPAM messages which scored over 10 were received from an
address block, then the known or estimated range of SPAM senders in that block
would be blacklisted using IPTables, with a daily review.

Probably not a good idea, since you don't know how big is remote network block. It might be something like /24, but it also might be something like /29. If you blindly assume it is /24, you'll get the spammer blocked (maybe, it just might be that one of your users had .forward file at remote site, and you can't know that either), but you will also penalize everybody else.


Plus, some mailing lists will happily forward spam from time to time, one popular example is Linux kernel mailing list... And there are some criminally managed lists such as Bugtraq, that don't forward spam (probably because it is moderated), but do some other stuff that might trigger things here and there. So you might just as likely end up blocking those, to delight of your users.

--
Aleksandar Milivojevic <[EMAIL PROTECTED]>    Pollard Banknote Limited
Systems Administrator                           1499 Buffalo Place
Tel: (204) 474-2323 ext 276                     Winnipeg, MB  R3T 1L7
_______________________________________________
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to