On Wed, 13 Jun 2018 07:22:20 -0400
Richard Hipp <d...@sqlite.org> wrote:

> Unfortunately, I'm going to need to shut down this mailing list due to
> robot harassment.  I am working to come up with a fix or an
> alternative now.  Your suggestions are welcomed.
> 
> This mailing list has operated for many years using GNU MailMan.
> Unfortunately, that software is not able to cope with modern robot
> spammers, even with the latest updates.  And the source code for
> MailMan is sufficiently opaque that I am unable to work on it.
> 
> The most recent problem is that robots are visiting the subscription
> page and entering innocent user's email addresses and names.  This
> causes a confirmation email to be sent to that user.  If it were just
> single confirmation email that the user could ignore, that would be
> fine.  But apparently MailMan sends one email for each subscription
> request.  The robots have figured this out and are putting in hundreds
> of subscription requests for the same individual, apparently to harass
> them.
> 
> I have already suspended new subscriptions.  Existing subscribers will
> be able to continue using this list until I come up with a replacement
> (or a fix to the current problem) but no new subscribers will be
> accepted.
> 

Hello,

Sounds like a nasty problem, sorry to hear.

The usual algorithm and way of dealing with this is to throttle the
nasty one's while degrading slightly the service for legitimate
subscribers. I have in mind spamd from OpenBSD when I am giving this
example here. Sounds like the code of MailMan is difficult to change is
this the repo:

https://savannah.gnu.org/cvs/?group=mailman

How many pieces of the infrastructure are under your control? What is
the pattern of undesired activity. If you can log the request for
registration and pick out the addresses you can block further emails
from being send, put a max etc.. If you control a firewall the only way
to really control stuff you can block throttle the access for the
offending IP's or networks while the problem appears. 

Such things are best dealt with initially by collecting data and
modifying the middle layer control algorithm or its meta data until you
have a good average. I am not someone who deals with this problem on a
daily basis so please take this with a grain of salt. 

I think the issue here is that mailman talks to your mail server and
then it is actually you sending the emails to the victims. Depending on
the mail server you may be able to limit the requests, block them
completely or parse or classify them as spam. The best solution if you
are not able to modify mailman and don't wish to mess with mail servers
is to write a capture service that speaks only the basics of the mail
protocol and can count the number of to headers with the same address
per second, minute whatever and only after that validation forward it to
the legitimate mail sending server. There must be a place where you
configure your mail server in mailman just plop your capture
service there and the mail server can be configured or will not care if
the mail takes another hop before arriving at 25.

There are certainly thousand ways to do this but since you're running
MailMan I assume you wish a clean and simple solution ... heck look at
SQLite ... so I think the capture one might be the best no matter what
the mailman like package and mail server. You are in control ultimately.

HTH,
Regards,
George

_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to