Morgan Wesstrvm <[EMAIL PROTECTED]> writes: > I haven't slept tonight so I simply don't understand what this > paragraph is saying or what its purpose is? Can I enter "fake" email > addresses here and if a GREY host happens to send a mail to this fake > address, that host gets blacklisted? How big is the chance that it > would try a fake random address I enter here...? (LOL, I can imagine > you have a good laugh by now but I really like to learn :-) )
This is where you may find a major source of entertainment. Yes, you can enter bogus addresses in the traplist. Yes, the easiest way to decide what to put in your traplist is to harvest from the joejob-generated bounce messages that keep piling up. For good measure, you can publish your list of spamtraps on the web and sit back and laugh at tail -f /var/log/spamd. My spammer traps are at <http://www.bsdly.net/~peter/traplist.shtml>, a series of blog posts about this very topic starts with the post <http://bsdly.blogspot.com/2007/07/hey-spammer-heres-list-for-you.html> and my newest spamd entertainment can be found at my still-fresh "Name and Shame Robot" page, <http://www.bsdly.net/~peter/nameandshame.html>. The name and shame part means essentially now that we have a list of IP addresses that have verifiably tried to deliver mail to our spamtraps, it is trivial to extract the log data of each of those addresses' actions from our spamd log. To the extent that the admins involved actually can be bothered to look, it's also a bit clearer evidence that they may have, er, potential for improvement than if we were just using the raw list of IP addresses. Socially responsible sysadmins, y'know. I infer from certain characters in your name and message headers that you're .se based, so my almost-done Norwegian writeup about the name and shame robot at <http://www.bsdly.net/~peter/nameandshame_no.txt> might provide some entertainment despite the funny spelling (I'm pondering compressing this to a third of the size for publication in one of the IT rags, and yes, I may even rewrite this in English given enough round tuits). - P -- Peter N. M. Hansteen, member of the first RFC 1149 implementation team http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/ "Remember to set the evil bit on all malicious network traffic" delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.