Source IP blocking makes up a large portion of today's spam arrest approach, so we shouldn't discount the CPU benefits of that approach too quickly.

I'm not sure where today's technology is in regards for caching the first 1 to 10kB of a session....once enough information is garnered to block, issue
TCP RSETs.  If it's good, free the contents of the cache.


What's your interest in mopping up spam in the middle of the network? Usually spam is viewed as a leaf-node problem (much to the chagrin of receivers, actually).

Regards,
Ken

--
Ken Simpson
CEO

MailChannels - Reliable Email Delivery
http://mailchannels.com
604 685 7488 tel





Reply via email to