Rick McMillin writes:
 > Does anyone know of any good reasons as to why QMail is better
 > suited to handle this attack?

Certainly something like this could happen.  And yes, it would be a
serious PITA because spammers rarely use a valid envelope sender, so
the mail would all double-bounce.  However, the whole point behind
this program is for a spammer to use the information provided by
rcpt-to to *avoid* having to send mail to every word in their
dictionary.  Since qmail doesn't provide any information, the first
qmail site a spammer picks on will suck down all of their emailing
capability, and they won't be successful in spamming, to the extent
that spamming achieves any success.

 > >In both cases on your server, if you're attacked, it will respond with a
 > >positive (or semi-positive in the case of vrfy) answer for EVERY word in
 > >their dictionary. Let's say they have a 500,000 word dictionary (I have no
 > >idea what size they use). Shortly after the harvesting attack, you're going
 > >to get 500,000 spams flooding into your mailserver (or more likely 5000
 > >messages with 100 BCC: recipients each?).

-- 
-russ nelson <[EMAIL PROTECTED]>  http://crynwr.com/~nelson
Crynwr supports Open Source(tm) Software| PGPok |   There is good evidence
521 Pleasant Valley Rd. | +1 315 268 1925 voice |   that freedom is the
Potsdam, NY 13676-3213  | +1 315 268 9201 FAX   |   cause of world peace.

Reply via email to