--- On Thu, 1/14/10, Ben Kamen <[email protected]> wrote:
> I've been using spampoison.com of late.  Kinda makes me laugh.

I use that resource too.  

My web server's malicious robot list is shared with the mail server - so robot 
sources get locked out from sending mail.  At the firewall level, I use a TCP 
TARPIT, and simulate one (returning "host prohibited") for UDP and other 
non-connecting protocols by using a "recent" list that traps on any 
non-permitted port or protocol (which is everything not specifically permitted).


Anything that does no harm to those who behave is fair game in my book.

_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to