public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Horiffic SPAM
@ 2003-09-23 18:11 Richard B. Johnson
  2003-09-23 18:36 ` Andrea Arcangeli
  2003-09-23 18:43 ` [OT] Re: Horiffic SPAM Grant Miner
  0 siblings, 2 replies; 18+ messages in thread
From: Richard B. Johnson @ 2003-09-23 18:11 UTC (permalink / raw)
  To: linux-kernel

[-- Attachment #1: Type: TEXT/PLAIN, Size: 846 bytes --]

Hello all,

I took root@chaos.analogic.com off the linux-kernel list
for a few days so I can trap the spammers and write their
addresses to `ipchains`. I have been getting approximately
12,000 email messages per day on that system, making it
impossible to use. It's all about the servers spreading
the M$ email virus with the phony message to update to the
latest security patches, plus a few hundred "penis-patch" spam
messages per hour.

Anyway, I am trying to fight back. I have attached a
tar-file which contains the source-code I use to create
anti-spam entries for `ipchains`. It also automatically
ties up the spammers and sends them an email message
asking them to stop, plus it logs the connections.

Cheers,

Richard B. Johnson
Project Engineer
Analogic Corporation
Penguin : Linux version 2.2.15 on an i586 machine (330.14 BogoMips).


[-- Attachment #2: Type: APPLICATION/x-gzip, Size: 17572 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread
* Re: Horiffic SPAM
@ 2003-09-24 15:08 John Bradford
  2003-09-24 16:21 ` David Lang
  0 siblings, 1 reply; 18+ messages in thread
From: John Bradford @ 2003-09-24 15:08 UTC (permalink / raw)
  To: rjohnson; +Cc: andrea, linux-kernel

> They are persistant, gang up, and will not give up until they are
> able to deliver the mail! When I firewall them, my network traffic
> ends up being continuous SYN floods

The ISP who supply this DSL connection have been rejecting connects to
their inbound SMTP server from unlisted IPs for ten minutes after the
initial connection attempt.  Retries after ten minutes are accepted,
and future connections are allowed immediately, unless the IP doesn't
make any connections for more than a week.

Apparently, it has reduced the volume of junk mail considerably, as
the 'virus' SMTP engines often don't bother to retry after getting a
4xx error code :-).  Obviously it delays genuine traffic coming
through that server slightly.

This may be a good solution to the problem for anyone who has control
of their own SMTP servers.

(Before anybody says that such greylisting by an ISP is irresponsible,
it's not in this case - unlike most DSL providers, they provide a real
static IP address block, (both v4 and v6), and fully configurable and
delegatable reverse DNS.  This means that there is no need to use
their SMTP server at all.  The most obvious setup is to run your own
primary SMTP server(s), and use theirs as a secondary.)

One theoretical solution to the whole junk mail problem that occurs to
me, would be for everybody to run a spoof open mail relay on port 25
of every IP under their control.  By that I mean a script that accepts
mail and claims that it will be delivered, but never delivers it.
Since the IPs running these spoof SMTP servers would never be listed
against an MX record anywhere, no genuine mail would go to them, only
junk.

Anybody sending junk mail via open relays they'd discovered via port
scanning would probably see a >99% reduction in the mails that
actually got through.  Presumably the companies who pay for the bulk
mail delivery would learn that their mails were not getting through,
and the business would cease to be profitable.

The only junk mail left would be from identifyable sources which is
_much_ easier to deal with.

Of course IPv6 will bring some of these benefits as hopefully ISPs
will assign static IP allocations, rather than dynamic ones.

John.

^ permalink raw reply	[flat|nested] 18+ messages in thread
* Re: Horiffic SPAM
@ 2003-09-24 16:45 John Bradford
  2003-09-24 17:22 ` David Lang
  2003-09-24 17:40 ` James Stevenson
  0 siblings, 2 replies; 18+ messages in thread
From: John Bradford @ 2003-09-24 16:45 UTC (permalink / raw)
  To: david.lang, john; +Cc: andrea, linux-kernel, rjohnson

> if you want to block mail you need to have your MTA return a 500 series
> error code when it gets a connection from that IP address, otherwise the
> sending MTA will just retry later, resulting in the problem described.

Read my post again.

A lot of the simple SMTP engines embedded in viruses _don't_ retry on
4xx error codes.  Real SMTP engines do.

That flaw is what we are taking advantage of, to filter out the junk.

I.E. we tell everybody 'come back later'.  Genuine mail does, whilst
junk mail often doesn't bother.

John.

^ permalink raw reply	[flat|nested] 18+ messages in thread

end of thread, other threads:[~2003-09-25 15:36 UTC | newest]

Thread overview: 18+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-09-23 18:11 Horiffic SPAM Richard B. Johnson
2003-09-23 18:36 ` Andrea Arcangeli
2003-09-23 18:53   ` Matt Heler
2003-09-23 19:06     ` offtopic (Re: Horiffic SPAM) Andrea Arcangeli
2003-09-24  3:15       ` Sandy Harris
2003-09-24  6:28     ` Horiffic SPAM Paul Dickson
2003-09-24 14:18   ` Richard B. Johnson
2003-09-25  8:21     ` [OT] " Helge Hafting
2003-09-25 12:30       ` Richard B. Johnson
2003-09-25 14:59       ` Valdis.Kletnieks
2003-09-25 15:36         ` Toshiba Tecra S1 Battery Status Bernt Hansen
2003-09-23 18:43 ` [OT] Re: Horiffic SPAM Grant Miner
  -- strict thread matches above, loose matches on Subject: below --
2003-09-24 15:08 John Bradford
2003-09-24 16:21 ` David Lang
2003-09-24 16:35   ` Wakko Warner
2003-09-24 16:45 John Bradford
2003-09-24 17:22 ` David Lang
2003-09-24 17:40 ` James Stevenson

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox