lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <026901c3196d$2d1b4f40$1d01320a@drizzt>
From: nexus at patrol.i-way.co.uk (Nexus)
Subject: About spamb strange characters

----- Original Message ----- 
From: <vogt@...senet.com>

[snip]

> You should see what finds its way into the abuse@ account. If the quality
> of abuse reports were better, more could be done about it. I have seen:

Being an ex sysadmin, recognise them - you missed the complaints from
recipients of spoofed MAIL FROM: emails ;-)
That said, surely it is not unreasonable to expect at least a response from
a technically accurate and reasoned complaint that includes the original
spam with headers complete and intact ?
Some ISP's will aggressively check their own netblocks for open relays - I
know mine does and that some people think of it as a nuisance - but if you
are savvy enough to set up a sane MTA, then you are savvy enough the
blackhole the relay checks, so no big deal really.
Except of course the *really* dumb ones that just look for the 550 response
rather than receiving the relayed mail itself but we are then back into the
domain [sic] of dummies again.

> So the problem is that dummies complaining about other dummies clog up
> the pipes. Solution? I don't know, maybe shoot all the dummies.

How about a "fit to use the internet" licence like you have for driving or
flying ?
Or owning a firearm.... nah, forget that one......

Cheers.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ