lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200210220350.g9M3o5Xx007664@mailserver2.hushmail.com>
From: gobbles at hush.com (gobbles@...h.com)
Subject: Administrivia - Regarding bulk mail

lol

On On Fri, 11 Oct 2002 04:49:50 -0700 John Cartwright <johnc@...k.org.uk> wrote:
>Hi
>
>The recent deluge of spam deserves some discussion, I believe.
>
>Firstly, to clarify, this bulk mail is *not* from gobbles@...hmail.com.
>The PGP signature is invalid, and the mail is spoofed. This appears 
>to 
>be an attempt to cause a DoS to the mailing list administration 
>at the
>price of safeguarding the list from this traffic.
>
>Since filtering this mail, we have been subjected to an SMTP-based 
>flood,
>with peak rates of > 200 mails/minute hitting our list. We have 
>observed 
>over 60 different source addresses in use during this time and I 
>have 
>submitted the offending IPs to the ORDB.
>
>Please be patient whilst we work to resolve this issue, and accept 
>the 
>fact that for an open list of this nature, some client-side filtering 
>is
>inevitable.
>
>Cheers
>- John
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html
>
>



Get your free encrypted email at https://www.hushmail.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ