DAve writes:
> jdow wrote:
> > From: "DAve" <[EMAIL PROTECTED]>
> > 
> >> Loren Wilton wrote:
> >>> It was mentioned that several people are getting hammered by 
> >>> world-wide robot attacks.  I see from the little spam I get that 
> >>> there is a new spam sending tool for robots that is running a stock 
> >>> spam.  I suspect the traffic is a combination of distributing the new 
> >>> spam tool and sending out the new spam.
> >>>
> >>> With all this traffic from robots, lots of people here must be 
> >>> getting quite a lot of information in their logs about connections 
> >>> from robots.  I wonder if there would be value in a central database 
> >>> that attempts to enumerater the robots?
> >>>
> >>> Most of them are probably on dynamic ip.  But if the sending IP and 
> >>> attempted connect time could be logged at many sites and combined, 
> >>> there would be fairly conclusive evidence that a given IP had been 
> >>> sending spam at a particular time.  Perhaps that could be submitted 
> >>> to at least some of the more responsible service providers, and they 
> >>> could do something to track it back to a customer and send them an 
> >>> email that their machine is infected. (Or possibly be even more 
> >>> proactive, I suppose.)
> >>>
> >>> The database might also be usable in front door spam blocking.  Most 
> >>> people probably shouldn't be accepting direct connections from 
> >>> dynamic ips on someone else's network, especially if that ip has a 
> >>> recent history of sending spam (say in the last 6 hours or so).  It 
> >>> might be possible to make a server that could provide yes/no answers 
> >>> on whether the IP has sent spam in the last minute/hour/6 hours/day 
> >>> or so.
> >>>
> >>> I'd think that such a database could be built almost automatically.  
> >>> For instance, if you log the IPs of connection attempts that you 
> >>> reject for various problems, you could just harvest those IPs once an 
> >>> hour or so to some central site, no human judgement calls required.  
> >>> If the mail is accepted and gets a high SA score, and you can still 
> >>> determine the sending IP, then that might be automatically harvested 
> >>> also.
> >>>
> >>> Thoughts?  Does somethign like this have any value?
> >>>
> >>>        Loren
> >>
> >> Something like http://dhsield.org, but limited to email instead of all 
> >> ports?
> > 
> > Don't know. (Not going to click on THAT link. It looks like it might
> > lead to a typo squatter potentially with malware. {^_-}) But I suspect
> > the answer is yes.
> 
> Hmmm, dsheild, dhsield, dshield, six of one half dozen of the other ;^)

Anyway, it certainly would have value -- that's one of the
input methods used to populate many of the DNSBLs.

--j.

Reply via email to