On 02/12/2014 15:28, Ted Mittelstaedt wrote: 

> On 12/1/2014 8:47 PM, Noel Butler wrote:
> On 02/12/2014 09:07, Reindl Harald wrote: Am 01.12.2014 um 23:46 schrieb 
> Franck Martin: On Nov 26, 2014, at 10:50 AM, Reindl Harald 
> <h.rei...@thelounge.net <mailto:h.rei...@thelounge.net>> wrote: Am 26.11.2014 
> um 19:45 schrieb Franck Martin: My experience says it is very useful
 my point in context of that thread is that using previous valid
addresses as honeypot is dangerous to stupid - you have no clue in most
cases about the context how the RCPT got chosen and i know a lot of
people sening once or twice a year some mail to their limited address
book congratulations if you in that case (you can't know) block the
whole sending server because one of your team memebers left not to
mention the number of people who run ancient backups, because they CBF
checking to see that their current backups still worked, and find they
are mailing a dead address. Harry and I rarely agree, but here we do, it
is a dangerous act - the only safe trap address are the ones never ever
used before, its only way you have 100% guaranteed zero FP's. 

This is assuming of course that your instantly blocking everything from
a sender that happens to email a honeypot.

Most honeypots are not used in such a draconian fashion.

But go ahead and be Draconian - I guess the only way you both can
justify a "win" on this argument is by assuming people use honeypots
in ways that simply are not done in reality.

For anyone else, this discussion about honeypots STARTED as a discussion
on where to find good Bays feeding sources. Don't bother engaging the
two Zealots, you will be wasting your time. <eyeroll>

Ted

most dont use it this way ? backup your statement with evidence. I await
your masses of proof 

do you even read what you dribble before click send? 

 

Reply via email to