lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20021011114950.GA3039@www1.grok.org.uk>
From: johnc at grok.org.uk (John Cartwright)
Subject: Administrivia - Regarding bulk mail

Hi

The recent deluge of spam deserves some discussion, I believe.

Firstly, to clarify, this bulk mail is *not* from gobbles@...hmail.com.
The PGP signature is invalid, and the mail is spoofed. This appears to 
be an attempt to cause a DoS to the mailing list administration at the
price of safeguarding the list from this traffic.

Since filtering this mail, we have been subjected to an SMTP-based flood,
with peak rates of > 200 mails/minute hitting our list. We have observed 
over 60 different source addresses in use during this time and I have 
submitted the offending IPs to the ORDB.

Please be patient whilst we work to resolve this issue, and accept the 
fact that for an open list of this nature, some client-side filtering is
inevitable.

Cheers
- John

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ