lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <441920EB.3070106@kc.rr.com>
Date: Thu Mar 16 08:29:20 2006
From: mattmurphy at kc.rr.com (Matthew Murphy)
Subject: Filtering Latest Spam Run (radio.toad.com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

In case you all hadn't noticed, there's another spam run underway.  This
attack also appears isolated to one host (radio.toad.com) that can be
successfully filtered until the admin can make the necessary rule change.

I've proposed that we start rate-limiting SMTP servers that post to the
list to reduce the impact of this kiddie business.  Until then, you can
identify and weed out the latest spam by setting a header match for:

    radio.toad.com

OR

    209.237.225.244

in your mail filters.

- --
"Social Darwinism: Try to make something idiot-proof,
nature will provide you with a better idiot."

                                -- Michael Holstein

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB5444D38

iD8DBQFEGSDrfp4vUrVETTgRA5ZbAJ0Y19YfQ5mTdlBoxYmfPJdCZfVt3wCfalgg
Xt71Cl4AaHF23GO6MyX3dbA=
=rqMS
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3436 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060316/3b283b02/smime.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ