On Friday 10 April 2009 12:53:45 pm Andy Bradford wrote: > Thus said Michael Torrie on Thu, 09 Apr 2009 14:44:19 MDT: > > I have noticed, though, that over the last year or two more and more > > spam bots are calling back and delivering their spam. Maybe we need to > > combine greylisting with some kind of tarpit idea. Where we hold onto > > their connection for 30-60 seconds before saying, "try back later." > > There are a number of things that help out in this respect. If you > really want to slow down spammers try using something like this: > > telnet 166.70.45.22 25 > > Try talking SMTP to that if you can. :-) > > A variant of your holding the connection idea has already been proven to > work: > > http://www.armory.com/~spcecdt/spamware/ > > For example, impose a 10 second wait for all hosts and a 30 second wait > for all hosts that don't have proper reverse DNS. In addition, there are > other tricks, like sending an error if any data is sent prior to the > SMTP 220 greeting banner (aka greetdelay). Like this: > > telnet 166.70.45.18 25 > > If you send HELO before you see the 220 banner you will not be able to > send me email. > > Andy > -- > [-----------[system uptime]--------------------------------------------] > 12:50pm up 52 min, 1 user, load average: 1.08, 1.02, 1.01 > > /* > PLUG: http://plug.org, #utah on irc.freenode.net > Unsubscribe: http://plug.org/mailman/options/plug > Don't fear the penguin. > */
Whoa. My ip's 160.7.244.25. That first IP is an annogram of mine. Trippy. -- Jessie Morris
signature.asc
Description: This is a digitally signed message part.
/* PLUG: http://plug.org, #utah on irc.freenode.net Unsubscribe: http://plug.org/mailman/options/plug Don't fear the penguin. */
