With all this talk of SA stalling, I decided to go ahead and post an idea
that a friend of mine posed to me a couple days ago. I don't think he is
interested in posting to the list, but he hates spam as much as I do.

The idea is to do something like the "CodeRed" tarpit (labrea, heh) did for
infected IIS servers, but instead use the technique to slow down MTA's that
are being used to deliver spam.

It would be trivial to modify spamassassin on a high score spam email, to
hand off the address of the offender to a tarpit daemon.

So if your MTA receives some spam, start sending half open tcp session
requests to the spam source/openrelay and slow it down. If a spammer hits
enough tarpits, then it would have the effect of totally DoS'ing the relay
he is using. I know that some of you will say this is a big legal risk, but
I wonder...

What if you changed your 220 line to say "By connecting you agree to legal
terms at http://blahblah"; ?
Would that be sufficient to prevent legal issues? (I am sure some company
will get pissed their mail server stopped working, and rather hire attornies
instead of geeks to fix the problem.)

Has anyone done anything like this yet? or has the idea been shotdown?

I didn't hear alot of noise from people that had issues with the CodeRed
tarpit. I see no difference between an unpatched IIS server that is being
used to firehose out a worm and a "misconfigured" open relay MTA that is
being used to firehose out a bunch of UCE.



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to