lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200210220350.g9M3o5Xx007664@mailserver2.hushmail.com> From: gobbles at hush.com (gobbles@...h.com) Subject: Administrivia - Regarding bulk mail lol On On Fri, 11 Oct 2002 04:49:50 -0700 John Cartwright <johnc@...k.org.uk> wrote: >Hi > >The recent deluge of spam deserves some discussion, I believe. > >Firstly, to clarify, this bulk mail is *not* from gobbles@...hmail.com. >The PGP signature is invalid, and the mail is spoofed. This appears >to >be an attempt to cause a DoS to the mailing list administration >at the >price of safeguarding the list from this traffic. > >Since filtering this mail, we have been subjected to an SMTP-based >flood, >with peak rates of > 200 mails/minute hitting our list. We have >observed >over 60 different source addresses in use during this time and I >have >submitted the offending IPs to the ORDB. > >Please be patient whilst we work to resolve this issue, and accept >the >fact that for an open list of this nature, some client-side filtering >is >inevitable. > >Cheers >- John >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.netsys.com/full-disclosure-charter.html > > Get your free encrypted email at https://www.hushmail.com
Powered by blists - more mailing lists