Bob Beck wrote:
There is a quasi standard perl script which I have posted and is
available
frequently referenced in the archives of this list, and has already been
mentioned
twice in this thread. it is not "standard" with OpenBSD because pieces of it
must be customized to be site spec
* Juan Miscaro <[EMAIL PROTECTED]> [2007-09-27 11:36]:
>
> --- Bob Beck <[EMAIL PROTECTED]> wrote:
>
> [snip]
>
> > greylisting does what it does. It delays the initial email
> > for 30 minutes or more. what you do with that 30 minutes will decide
> > on how effective it is for you.
> >
>
--- Bob Beck <[EMAIL PROTECTED]> wrote:
[snip]
> greylisting does what it does. It delays the initial email
> for 30 minutes or more. what you do with that 30 minutes will decide
> on how effective it is for you.
>
> In that 30 minutes)
[snip]
> 4) optionally, if you check the gr
On Wed, 26 Sep 2007 17:02:50 +0300
Liviu Daia <[EMAIL PROTECTED]> wrote:
> Why should it? The second copy is sent in a separate run, that's
> the whole point. The only thing the bot has to figure out is how long
> to wait until the second run. A smart one would send a second copy
> after 10
On Wed, 26 Sep 2007 17:26:22 +0200, Peter N. M. Hansteen wrote:
>
>> Or take advantage of the (by default) 25 minute window to use other
>> means to detect that this address is sending spam. Perhaps spamd should
>> be extended to look for excessive attempts to send messages from an
>> address dur
Rob <[EMAIL PROTECTED]> writes:
> I would guess the latter too, except that they tend to wait the full
> default 10 seconds until the first 250 response. I'm looking forward
> to increasing the stutter time to something on the order of 60 seconds
> and watching to see what happens then.
I have re
Hannah,
On 9/26/07, Hannah Schroeter <[EMAIL PROTECTED]> wrote:
> Hi!
>
> On Wed, Sep 26, 2007 at 02:03:03PM -0700, Rob wrote:
> >[...]
>
> >While watching the connection logs, I've noticed that a large majority
> >of spammers get the first spamd response ("250 Hello, spam sender.
> >Pleased to be
Hi!
On Wed, Sep 26, 2007 at 02:03:03PM -0700, Rob wrote:
>[...]
>While watching the connection logs, I've noticed that a large majority
>of spammers get the first spamd response ("250 Hello, spam sender.
>Pleased to be wasting your time.") and immediately disconnect. This
>suggests to me that rat
> Oh, I'm not saying it doesn't work. What I'm saying is, greylisting
> is trivial to bypass, and some spammers have figured that out.
> Amazingly, most of them still haven't, which is why it still works in a
> significant number of cases.
Just to give an additional data point here: I work fo
On 26 September 2007, Bob Beck <[EMAIL PROTECTED]> wrote:
> > Oh, I'm not saying it doesn't work. What I'm saying is,
> > greylisting is trivial to bypass, and some spammers have figured
> > that out. Amazingly, most of them still haven't, which is why it
> > still works in a significant numb
On 26 September 2007, Jeremy C. Reed <[EMAIL PROTECTED]> wrote:
> On Wed, 26 Sep 2007, Liviu Daia wrote:
>
> > Same, 28 minutes later:
> >
> > Sep 25 18:42:52 ns1 postfix-localhost/smtpd[13055]: 72BCD142A7:
> > client=unknown[212.239.40.101]
> > Sep 25 18:42:53 ns1 postfix/cleanup[21622]: 72
On Wed, 26 Sep 2007, Liviu Daia wrote:
> Same, 28 minutes later:
>
> Sep 25 18:42:52 ns1 postfix-localhost/smtpd[13055]: 72BCD142A7:
> client=unknown[212.239.40.101]
> Sep 25 18:42:53 ns1 postfix/cleanup[21622]: 72BCD142A7: message-id=<[EMAIL
> PROTECTED]>
> Sep 25 18:42:53 ns1 postfix/qmgr
> Oh, I'm not saying it doesn't work. What I'm saying is, greylisting
> is trivial to bypass, and some spammers have figured that out.
> Amazingly, most of them still haven't, which is why it still works in a
> significant number of cases.
>
greylisting does what it does. It delays t
On 26 September 2007, Peter N. M. Hansteen <[EMAIL PROTECTED]> wrote:
> Liviu Daia <[EMAIL PROTECTED]> writes:
>
> > Why should it? The second copy is sent in a separate run,
> > that's the whole point. The only thing the bot has to figure out
> > is how long to wait until the second run. A
On Wed, 2007-09-26 at 16:01 +0100, Craig Skinner wrote:
> The defaults work very well:
> See: http://www.ualberta.ca/~beck/nycbug06/spamd/mgp1.html
> Hear: http://www.fetissov.org/public/nycbsdcon06/2.4.mp3
Maybe this also has to do with amount and type of traffic you get.
Small shops are prob
On Wed, 2007-09-26 at 17:38 +0300, Liviu Daia wrote:
> That's up to you. The minimum should be large enough to keep away
> "naive" bots, as it does now. The maximum should be as large as you
> can afford without being too anti-social. :) Some crap will still pass
> through anyway.
Sometimes
Dave Anderson <[EMAIL PROTECTED]> writes:
> Or take advantage of the (by default) 25 minute window to use other
> means to detect that this address is sending spam. Perhaps spamd should
> be extended to look for excessive attempts to send messages from an
> address during that period? (How often
On 2007/09/26 11:03, Dave Anderson wrote:
>
> Or take advantage of the (by default) 25 minute window to use other
> means to detect that this address is sending spam. Perhaps spamd should
> be extended to look for excessive attempts to send messages from an
> address during that period?
google:
On Wed, 26 Sep 2007, Liviu Daia wrote:
>On 26 September 2007, Craig Skinner <[EMAIL PROTECTED]> wrote:
>> Liviu Daia wrote:
>> >
>> > How does spamd distinguish between a legitimate retry and a
>> > re-injection of the same message with the same Message-Id, sender
>> > etc.?
>>
>> It doesn't.
Liviu Daia wrote:
That's up to you. The minimum should be large enough to keep away
"naive" bots, as it does now. The maximum should be as large as you
can afford without being too anti-social. :) Some crap will still pass
through anyway.
The maximum should also leave plenty of time b
Liviu Daia <[EMAIL PROTECTED]> writes:
> Why should it? The second copy is sent in a separate run, that's
> the whole point. The only thing the bot has to figure out is how long
> to wait until the second run. A smart one would send a second copy
> after 10 minutes, and a third one after, s
On 26 September 2007, Liviu Daia <[EMAIL PROTECTED]> wrote:
> On 26 September 2007, Luca Corti <[EMAIL PROTECTED]> wrote:
> > On Wed, 2007-09-26 at 17:02 +0300, Liviu Daia wrote:
> > > > Another delivery attempt would be needed after this time to pass
> > > > spamd.
> > > Moral: randomize the g
On 26 September 2007, Luca Corti <[EMAIL PROTECTED]> wrote:
> On Wed, 2007-09-26 at 17:02 +0300, Liviu Daia wrote:
> > > Another delivery attempt would be needed after this time to pass
> > > spamd.
> > Moral: randomize the greylisting time...
>
> Between which min/max valuse? Keep in mind that
Liviu Daia wrote:
Why should it? The second copy is sent in a separate run, that's
the whole point. The only thing the bot has to figure out is how long
to wait until the second run. A smart one would send a second copy
after 10 minutes, and a third one after, say, 35 minutes.
OK, but yo
On Wed, 2007-09-26 at 17:02 +0300, Liviu Daia wrote:
> > Another delivery attempt would be needed after this time to pass
> > spamd.
> Moral: randomize the greylisting time...
Between which min/max valuse? Keep in mind that this corresponds to the
(minimum) delay introduced in delivering a goo
On 26 September 2007, Craig Skinner <[EMAIL PROTECTED]> wrote:
> Liviu Daia wrote:
> >
> > How does spamd distinguish between a legitimate retry and a
> > re-injection of the same message with the same Message-Id, sender
> > etc.?
>
> It doesn't.
>
> Just what you described would probably be wi
On Wed, 26 Sep 2007, Liviu Daia wrote:
> On 26 September 2007, Damien Miller <[EMAIL PROTECTED]> wrote:
> > On Wed, 26 Sep 2007, Liviu Daia wrote:
> >
> > > Greylisting is trivial to bypass, with or without a queue: just
> > > send the same messages twice. Some spammers have figured that out
Liviu Daia wrote:
How does spamd distinguish between a legitimate retry and a
re-injection of the same message with the same Message-Id, sender etc.?
It doesn't.
Just what you described would probably be within the default 25 mins
grey period. Another delivery attempt would be needed af
On 26 September 2007, Damien Miller <[EMAIL PROTECTED]> wrote:
> On Wed, 26 Sep 2007, Liviu Daia wrote:
>
> > Greylisting is trivial to bypass, with or without a queue: just
> > send the same messages twice. Some spammers have figured that out
> > long ago. Ever wondered why sometimes you rec
On Wed, 26 Sep 2007, Liviu Daia wrote:
> Greylisting is trivial to bypass, with or without a queue: just send
> the same messages twice. Some spammers have figured that out long ago.
> Ever wondered why sometimes you receive 2 or 3 copies of the same spam,
> from the same IP, with the same Me
On 26 September 2007, Craig Skinner <[EMAIL PROTECTED]> wrote:
> RW wrote:
> >
> > What I was getting looked like backscatter and smelled like backscatter
> > it is just that some of the IPs sending it didn't check out as MTAs.
> > i.e. they were not listed MXs for the domain they came from AND th
Craig Skinner <[EMAIL PROTECTED]> writes:
> 'bots getting smart eh? Bugger! If that is the trend, greylisting
> starts to lose its value as spammers adapt to the RFCs.
If they adapt to greylisting and start following relevant RFCs, we've
succeeded in making spamming more expensive. I don't see th
RW wrote:
What I was getting looked like backscatter and smelled like backscatter
it is just that some of the IPs sending it didn't check out as MTAs.
i.e. they were not listed MXs for the domain they came from AND the
domain was not likely someone with separate outbound senders.
They all retri
Chris Smith wrote:
On Tuesday 25 September 2007, Craig Skinner wrote:
If you are using postfix:
/etc/postfix/main.cf:
..
..
smtpd_recipient_restrictions =
reject_non_fqdn_hostname
reject_invalid_hostname
reject_non_fqdn_sender
reject_non_fqdn_recipient
On Wed, 26 Sep 2007 03:16:35 +0300, Liviu Daia wrote:
>
>> Postfix would just be rejecting them and filling its logs.
>
>Oh come on, these days you're probably rejecting > 95% of messages
>anyway. :)
Nope. Every day at log reading time I do "grep reject maillog" and very
rarely do I see a res
On 26 September 2007, RW <[EMAIL PROTECTED]> wrote:
> On Tue, 25 Sep 2007 14:14:46 +0300, Liviu Daia wrote:
>
> >On 25 September 2007, RW <[EMAIL PROTECTED]> wrote:
> >[...]
> >> My defence was to write a couple of scripts. One parsed the output
> >> of spamdb looking for GREY with sender <> and th
On Tue, 25 Sep 2007 14:14:46 +0300, Liviu Daia wrote:
>On 25 September 2007, RW <[EMAIL PROTECTED]> wrote:
>[...]
>> My defence was to write a couple of scripts. One parsed the output of
>> spamdb looking for GREY with sender <> and then tested the intended
>> recipient against the postfix valid m
On Tue, 25 Sep 2007 12:40:50 +0100, Craig Skinner wrote:
>RW wrote:
>>
>> The others were from bots as far as I could tell but they were not
>> being sent by MTAs which had received them.
>>
>
>Yes, but the OPs problem is back scatter, and that does not come from
>bots, they don't retry.
>
Wha
On Tuesday 25 September 2007, Craig Skinner wrote:
> If you are using postfix:
>
> /etc/postfix/main.cf:
> ..
> ..
> smtpd_recipient_restrictions =
> reject_non_fqdn_hostname
> reject_invalid_hostname
> reject_non_fqdn_sender
> reject_non_fqdn_recipient
>
On 25 September 2007, RW <[EMAIL PROTECTED]> wrote:
[...]
> My defence was to write a couple of scripts. One parsed the output of
> spamdb looking for GREY with sender <> and then tested the intended
> recipient against the postfix valid mailbox database.
[...]
With Postfix you can use anvil(8
RW wrote:
The others were from bots as far as I could tell but they were not
being sent by MTAs which had received them.
Yes, but the OPs problem is back scatter, and that does not come from
bots, they don't retry.
$ man spamd:
DESCRIPTION
spamd is a fake sendmail(8)-like daemon whic
Stuart Henderson wrote:
I had a question off-list about how to do this, so I guess
some other people will benefit from an example of how to set
this up.
If you are using postfix:
/etc/postfix/main.cf:
..
..
smtpd_recipient_restrictions =
reject_non_fqdn_hostname
reject_inval
"RW" <[EMAIL PROTECTED]> writes:
> One was bounced mail that should have been rejected as "invalid
> recipient" mail at the original target. That included an mx at
> aph.gov.au, the Australian Federal Parliamnet House. Yep, the pollies
> who want ISPs to block websites on request and who spent $84
On Tue, 25 Sep 2007 09:38:10 +0100, Craig Skinner wrote:
>Greylisting is of no use whatsoever because the servers sending the
>bounces to you are actual smtp boxes (sendmail, extrange, ), not
>malware, so they will quickly bypass spamd. Spamd greytraps will help a
>great deal, but you say
On 2007/09/25 10:29, Stuart Henderson wrote:
> Also: all hosts listed in MX records should be aware of the
> list of valid users and do the same. For sendmail, this is easy
> to do with the access map.
I had a question off-list about how to do this, so I guess
some other people will benefit from a
Stuart Henderson <[EMAIL PROTECTED]> writes:
> If it's compatible with how you use the domain, it might help
> to publish SPF records.
I suppose I'll never know how many receivers of spam claiming to be
from [EMAIL PROTECTED] (yes, fresh from the source) and friends
actually acted on the SPF info
On 2007/09/25 00:08, patrick keshishian wrote:
>
> I'm very certain right now, this flood is due to a spammer
> using these fake addresses @my-domain-name to spam these mail
> server (all around the world -- Japan, South America, US,
> Germany, Ireland, etc...) and I'm getting the brunt of it in
>
Craig Skinner <[EMAIL PROTECTED]> writes:
> malware, so they will quickly bypass spamd. Spamd greytraps will help
> a great deal, but you say that the addresses are random.
I think what happened here is that somebody let the random address
generator run for longer than intended.
One or more sp
patrick keshishian wrote:
I'm very certain right now, this flood is due to a spammer
using these fake addresses @my-domain-name to spam these mail
server (all around the world -- Japan, South America, US,
Germany, Ireland, etc...) and I'm getting the brunt of it in
the form of these bounced mess
"patrick keshishian" <[EMAIL PROTECTED]> writes:
> When you speak of "misconfigured mail servers bouncing spam",
> what exactly is a "proper configured mail server" supposed to
> do with spam directed at non-existing user @their-host-name?
The real question in there is, what does a properly confi
On 9/23/07, Peter N. M. Hansteen <[EMAIL PROTECTED]> wrote:
> "patrick keshishian" <[EMAIL PROTECTED]> writes:
>
> > I'm running spamdb in greylist mode, but these servers were
> > getting white-listed very quickly.
>
> Then it sounds almost like you were running with a too short passtime,
> but th
On 9/24/07, Stuart Henderson <[EMAIL PROTECTED]> wrote:
> On 2007/09/23 20:53, patrick keshishian wrote:
> >
> > They seemed pretty random to me, but I did a quick
> > check after reading your response and I see 468 unique
> > "fake" email address @my-domain, only one was
> > duplicated twice.
>
>
On 2007/09/23 20:53, patrick keshishian wrote:
>
> They seemed pretty random to me, but I did a quick
> check after reading your response and I see 468 unique
> "fake" email address @my-domain, only one was
> duplicated twice.
What's the problem, they'll just be dropped "user unknown"
by your MTA
"patrick keshishian" <[EMAIL PROTECTED]> writes:
> I'm running spamdb in greylist mode, but these servers were
> getting white-listed very quickly.
Then it sounds almost like you were running with a too short passtime,
but then that's easy to adjust.
> At around 1:40 PM (PDT) my SMTP server star
patrick keshishian wrote:
They seemed pretty random to me, but I did a quick
check after reading your response and I see 468 unique
"fake" email address @my-domain, only one was
duplicated twice.
Put greyscanner from Bob in there and sit back and enjoy the look! (;>
Make sure you pick the vers
On 9/23/07, Darrin Chandler <[EMAIL PROTECTED]> wrote:
> On Sun, Sep 23, 2007 at 03:33:03PM -0700, patrick keshishian wrote:
> > At around 1:40 PM (PDT) my SMTP server started getting flooded
> > by enormous amount of connections. The connections were for
> > seemingly random "users" @my-domain-na
On Sun, Sep 23, 2007 at 03:33:03PM -0700, patrick keshishian wrote:
> At around 1:40 PM (PDT) my SMTP server started getting flooded
> by enormous amount of connections. The connections were for
> seemingly random "users" @my-domain-name.
>
> I'm running spamdb in greylist mode, but these servers
Hi all,
At around 1:40 PM (PDT) my SMTP server started getting flooded
by enormous amount of connections. The connections were for
seemingly random "users" @my-domain-name.
I'm running spamdb in greylist mode, but these servers were
getting white-listed very quickly.
$ /usr/sbin/spamdb | /usr/b
58 matches
Mail list logo