lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1166001902.15211.4.camel@DustPuppy.LNX.RO>
Date:	Wed, 13 Dec 2006 11:25:02 +0200
From:	Dumitru Ciobarcianu <Dumitru.Ciobarcianu@...s.ro>
To:	Matti Aarnio <matti.aarnio@...iler.org>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: Postgrey experiment at VGER

On Wed, 2006-12-13 at 01:50 +0200, Matti Aarnio wrote:
> I do already see spammers smart enough to retry addresses from
> the zombie machine, but that share is now below 10% of all emails.
> My prediction for next 200 days is that most spammers get the clue,
> but it gives us perhaps 3 months of less leaked junk.

IMHO this is only an step in an "arms race".
What you will do in three months, remove this check because it will
prove useless since the spammers will also retry ? If yes, why install
it in the first place ? 


-- 
Cioby

Opinions expressed do not belong to any company.
I'm not sure they belong to me either.


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ