Morgan Wesstrvm <[EMAIL PROTECTED]> writes:

> I haven't slept tonight so I simply don't understand what this
> paragraph is saying or what its purpose is? Can I enter "fake" email
> addresses here and if a GREY host happens to send a mail to this fake
> address, that host gets blacklisted? How big is the chance that it
> would try a fake random address I enter here...? (LOL, I can imagine
> you have a good laugh by now but I really like to learn :-)  )

This is where you may find a major source of entertainment.  Yes, you
can enter bogus addresses in the traplist.  Yes, the easiest way to
decide what to put in your traplist is to harvest from the
joejob-generated bounce messages that keep piling up.  For good
measure, you can publish your list of spamtraps on the web and sit
back and laugh at tail -f /var/log/spamd.

My spammer traps are at <http://www.bsdly.net/~peter/traplist.shtml>,
a series of blog posts about this very topic starts with the post
<http://bsdly.blogspot.com/2007/07/hey-spammer-heres-list-for-you.html>
and my newest spamd entertainment can be found at my still-fresh "Name
and Shame Robot" page, <http://www.bsdly.net/~peter/nameandshame.html>.

The name and shame part means essentially now that we have a list of
IP addresses that have verifiably tried to deliver mail to our
spamtraps, it is trivial to extract the log data of each of those
addresses' actions from our spamd log.  To the extent that the admins
involved actually can be bothered to look, it's also a bit clearer
evidence that they may have, er, potential for improvement than if we
were just using the raw list of IP addresses.  Socially responsible
sysadmins, y'know.

I infer from certain characters in your name and message headers that
you're .se based, so my almost-done Norwegian writeup about the name
and shame robot at <http://www.bsdly.net/~peter/nameandshame_no.txt>
might provide some entertainment despite the funny spelling (I'm
pondering compressing this to a third of the size for publication in
one of the IT rags, and yes, I may even rewrite this in English given
enough round tuits).

- P
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to