Michael Rathbun via mailop <mailop@mailop.org> wrote:
    >> This means that each delivery attempt from a trapped host typically takes
    >> between 300 and 700 seconds, with a few *extreme* outliers.

    > After an initial email to a "sudden death" spamtrap here, the IP is put 
on the
    > no-connect list for 24 hours.  On a second offense, it is now three days. 
Then
    > six days, then eleven days.

What? I would expect you do go by prime numbers. 3,7,11.. :-)
Actually, I seriously wonder if there are recurrences that are important.
I observer that many traces still see north american diurnal cycles in malicious
traffic, indicating that it's still being driven by enterprise desktop PCs
that get turned off at night.

    > Recently an average day will see 52 first-time offenders, and several 
hundred
    > connection attempts from blocked IPs, often including retries from
    > just-blocked sources.  This morning the logs showed that on the previous 
day
    > we had 67 connection attempts from IPs which had offended at least
    > twice.

Do you consider greytrapping (1-byte window, labrea tar-pit) them all rather
than blocking?
I'm trying to think of some way to encode enough state into a TCP SEQ NUMBER or
something like that in order to allow greytrapping without maintaining state
at your end.

    > Two
    > of those IPs belong to Google.

Someone just has to email to one of your trap addresses from gmail, right?

Your setup is one I've wanted to replicate for awhile.
I just haven't gotten around to it.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [

Attachment: signature.asc
Description: PGP signature

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to