--- On Thu, 1/14/10, Ben Kamen <[email protected]> wrote: > I've been using spampoison.com of late. Kinda makes me laugh.
I use that resource too. My web server's malicious robot list is shared with the mail server - so robot sources get locked out from sending mail. At the firewall level, I use a TCP TARPIT, and simulate one (returning "host prohibited") for UDP and other non-connecting protocols by using a "recent" list that traps on any non-permitted port or protocol (which is everything not specifically permitted). Anything that does no harm to those who behave is fair game in my book. _______________________________________________ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list [email protected] http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

