On Thu, Mar 31, 2011 at 1:41 PM, Stan Hoeppner <s...@hardwarefreak.com>wrote:

> D G Teed put forth on 3/31/2011 10:21 AM:
>
> > I'd like some idea of what real world values would be useful, or
> additional
> > suggestions
> > on how to make the performance less attractive to users of compromised
> > accounts.
>
> When you find a reasonable and effective solution to the phishing
> problem please share it with the rest of us.
>
> The only sure fire solution I'm currently aware of is mass executions of
> stupid and/or ignorant people who have no business using a computer or
> email.  The obvious problem with this solution is it requires
> exterminating well over half the human race, including many/most of my
> family members.  Not an appealing solution.
>

I think you misunderstood what I wrote.  I listed actual postfix
variables, looking for input on practical values.  This isn't unreasonable
to expect.  I've implemented restrictions on our webmail's SMTP
to the point that spammers login, send a few emails, find it doesn't work
for large number of recipients and then logout.  It works and I'm not
dreaming.
Horde developers have also set up limits which greatly discourage
spamming.  The only problem is we can't choke the number of
recipients on our general SMTP.

I was hoping for angles on rate limiting which normal users could live with
but would be useless for spam.  In the couple of responses so far, it seems
it requires
something external - too bad it requires more layers - I hoped it was within
the capabilities of anvil and such.

Actually, this conversation has me thinking, maybe we should have a
dedicated
SMTP just for external SMTP + TLS + SASL.  That way I can do the same
recipient limit throttling and tell people not to expect it will work for
mass
mail outs.

--Donald

Reply via email to