Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Spam

De-spamming Your Inbox The Hard Way 631

ajain writes "Even after using precautions like dummy email address in public forums, I have been plagued by the spam mails for long time now. Accidentally, I hit upon a not-so-elegant but effective solution recently: Ever thought of shutting down the mail server temporarily to stop spam to your inbox permanently? Well, it seems to work. In my case, a two-day shutdown resulted in 97.5% decrease in spam traffic! Here are the details and a step-by-step guide to this desperate-method of spam reduction. I think I'll model, simulate and then optimize the amount of shut-down time required for spam levels to drop to zero!"
This discussion has been archived. No new comments can be posted.

De-spamming Your Inbox The Hard Way

Comments Filter:
  • by BaldGhoti ( 265981 ) on Thursday December 09, 2004 @03:36PM (#11045009) Homepage
    ...if you don't mind missing potentially important emails. It's a bit overdrastic and if you're supporting multiple users, it's going to be a totally unacceptable solution.
  • by admp ( 778242 ) <adomas@paltanavicius.gmail@com> on Thursday December 09, 2004 @03:37PM (#11045024) Homepage
    This is the same as not using email at all. Personally I find this technique useless. Don't you?
  • by John the Kiwi ( 653757 ) <(moc.iwikehtnhoj) (ta) (iwik)> on Thursday December 09, 2004 @03:39PM (#11045053) Homepage
    What are the odds the new mail server he is using put spam filters on there for him and he just didn't notice?
  • NO!!!! (Score:1, Insightful)

    by Anonymous Coward on Thursday December 09, 2004 @03:39PM (#11045054)
    After reception bounces (ie they've hit your inbox) are a BAD, HORRIBLE idea. Most of the information in spam is forged. If you can reject at SMTP reception time, then it's best to use a service like SpamCop to report the offenders.
  • consequence: (Score:5, Insightful)

    by Progman3K ( 515744 ) on Thursday December 09, 2004 @03:39PM (#11045055)
    A few hundred random people received
    "The message you sent X was undeliverable"
    spam instead.

    Nice.
  • by takitus ( 733922 ) on Thursday December 09, 2004 @03:41PM (#11045098)
    the fact they might have installed some anti-spam filters when they were upgrading the mail server? duhhh
  • by sterno ( 16320 ) on Thursday December 09, 2004 @03:42PM (#11045115) Homepage
    The article says that the school upgraded to a new version of Exchange during that two day period. IS it possible that during the course of the upgrade they also added some anti-spam features that aren't visible to the end user?

    I know that personally I've had my mail server go down for more than two days without a backup relay and had no notable drop in spam traffic.
  • by ChrisPee ( 810133 ) on Thursday December 09, 2004 @03:43PM (#11045122) Homepage
    I would much rather spend 2-3 minutes a day deleting those spams that weren't caught by my automated spam filter, then miss even one legitimate business email message.
  • Re:KDEMail? (Score:4, Insightful)

    by rf600r ( 236081 ) on Thursday December 09, 2004 @03:43PM (#11045127) Homepage
    Bounce != no SMTP session at all

    Spammers care little if at all about bounces. Ponder, for a moment, how many bounce messages his server sent when it was off if this is still confusing you.
  • by Xeo2 ( 301694 ) on Thursday December 09, 2004 @03:44PM (#11045141) Homepage Journal
    I don't think you understand. Your way is hard. His is easy.
  • Yes (Score:1, Insightful)

    by Anonymous Coward on Thursday December 09, 2004 @03:44PM (#11045144)
    That sounds like a more reasonable explanation. I've had domains that got spam which I then didn't host anywhere for years, and then re-hosted, and they still got spam.
  • Unacceptable (Score:4, Insightful)

    by DanteBlack ( 656808 ) on Thursday December 09, 2004 @03:46PM (#11045175)
    This is a totaly unacceptable solution in a real-world business environment. Two days worth of bounced emails and even a moderate size company could miss over a $100K worth of online orders. Worse yet they could lose a current customer or, almost certainly, a potential customer. Customers as a rule don't take kindly to bounced orders and then they go to a competitor.

    There are drop in solutions out there. Use them if it's a real issue.
  • Re:KDEMail? (Score:5, Insightful)

    by Erik Hensema ( 12898 ) on Thursday December 09, 2004 @03:47PM (#11045179) Homepage

    No. Bounces never reach the spammer. Ever. Spammers always use fake sender addresses, so the bounces will go to an innocent bystander.

    So, while totally ineffective, you also burden the innocent bystander with yet another bounce.

    The only way to combat spam is to reject it on the SMTP level.

    Note that the guy in the article was wrong. When a mailserver is offline for two days, no bounces are sent. Sending mailservers will usually retry for 5 days before bouncing the message.

    However, spammers don't use mailservers to send their spam, they deliver the spam direcly to the receiving mailserver. They've got instant feedback on wether the spam is accepted by the mailserver or not.

    When a mailserver is offline, spammers will know immediately. However I doubt they'd remove your name from the list because of this simple fact. Mailservers are regulary offline for multiple days.

    In this case I rather think they installed a very good spamfilter on that brand new Exchange Server.

  • by SoTuA ( 683507 ) on Thursday December 09, 2004 @03:51PM (#11045233)
    I don't know what this guy did but he is thoroughly mistaken.

    I'd bet a beer that the new mail server installed at his institute includes some form of spam protection. My university's mail system has gone down for two days, and I still get one or two hundred spam mails a day. (of course, only one or two make it through the spam filters :)

  • by naelurec ( 552384 ) on Thursday December 09, 2004 @03:59PM (#11045334) Homepage
    My thoughts exactly. This is a non-article, its amazing that it was posted to this site. With DNSRBL lists, some reasonable SMTP level filtering and spamassassin, I have had similar success in reducing the amount of spam.
  • trusted friends (Score:2, Insightful)

    by oliverthered ( 187439 ) <oliverthered@nOSPAm.hotmail.com> on Thursday December 09, 2004 @04:07PM (#11045431) Journal
    Use pgp and sign there email.
  • by meme_police ( 645420 ) on Thursday December 09, 2004 @04:21PM (#11045596)
    "The servers trying to reach you will fail to connect, timeout, wait, try again. They don't try once and then give up."

    Legitimate servers do that. Spammers and SMTP trojans on hijacked home computers don't usually try again.

  • Re:Shutdown (Score:3, Insightful)

    by bluelip ( 123578 ) on Thursday December 09, 2004 @04:28PM (#11045676) Homepage Journal
    If it was going to take that long, I'd throw up another box, point an mx record to it and hold the email there.

    Would look more professional that eveyone getting email around the lines of "Your email could not be sent for the past X hours......"

    Sendmail will do this almost out of the box if MX records are correct.

  • by bwindle2 ( 519558 ) on Thursday December 09, 2004 @04:39PM (#11045807)
    How long until the spammers simply queue undeliverable email, and try again after a few minutes? I'm suprised they all haven't yet.
  • by bwindle2 ( 519558 ) on Thursday December 09, 2004 @04:43PM (#11045846)
    And how is your border router (layer 3) going to see the RCPT TO address (layer 7)? Routers just pass packets, they don't examine packets for certain data. I've never seen a firewall that will examine TCP/25 packets for a RCPT TO address, either.
  • by Kethinov ( 636034 ) on Thursday December 09, 2004 @05:01PM (#11046034) Homepage Journal
    I wonder if someone might write a program or plugins for existing mail programs to adapt on this approach? Every time you mark a mail as junk, it sends it back to your mail server to be treated as if it were bounced. This way anything you mark as junk gets bounced back to the spammer as if your mail server was down. Have the cake and eat it too?
  • Not a good idea (Score:5, Insightful)

    by Q2Serpent ( 216415 ) on Thursday December 09, 2004 @05:03PM (#11046069)
    Many spam emails have forged 'from' addresses and/or envelope senders, so if you bounce the email, the bounce may end up at some unsuspecting person's email. This only adds to the problem.
  • by ari_j ( 90255 ) on Thursday December 09, 2004 @05:43PM (#11046392)
    The problem here is that spamming is easily modeled by game theory, and the spammers have a dominant strategy.

    Your move: optimize how long you need to shut down your e-mail in order to minimize spam. Their move: check one day longer than your precaution allows for.

    They can keep pushing it back until it is no longer useful for you to even have e-mail in the first place (i.e., you have more downtime than uptime), and either you end up not using e-mail at all or you end up receiving lots of spam.
  • by Chris84000000 ( 735658 ) <chris AT connett DOT net> on Thursday December 09, 2004 @06:06PM (#11046612) Homepage
    My guess for the reason the spam goes down is because when the mail server is off, it is unreachable, so the spamming program must wait for TCP connection request packets to timeout. Simply bouncing gives an immediate response, and the spammer won't care. But if the spamming operation has to hold up for a few seconds trying to reach a down machine, that actually motivates the spammer to remove you.

    Since a TCP session must be set up before the message is transmitted, you can't have your cake and eat it too. At least not as the parent suggests.
  • by whodkne ( 778580 ) on Thursday December 09, 2004 @06:19PM (#11046712) Homepage
    I just setup a catchall account on my domain and use whereIampostingmyemail@mydomain.com for every email address I give out. Not only does that identify WHO is sending me spam (shadyecomstore.com@mydomain.com) so I can track back and yell at them, but it allows me to create a rule to block addresses if they get to be too spammed over. This seems to work pretty well along with Baysean filtering and a few rules I have setup.
  • by schickb ( 629869 ) on Thursday December 09, 2004 @06:25PM (#11046764)
    I think I'll model, simulate and then optimize the amount of shut-down time required for spam levels to drop to zero

    No need for models and simulations... the answer is 'shut-down time' = Infinity
  • Re:KDEMail? (Score:3, Insightful)

    by jonwil ( 467024 ) on Thursday December 09, 2004 @07:25PM (#11047243)
    Thats why we need to push for much greater adoption of Sender Permitted From (SPF).
    That should prevent fake email addresses from being used.
    Unfortunatly, large ISPs and email providers dont seem to want to implement SPF records for their mailservers.
  • by jonastullus ( 530101 ) on Thursday December 09, 2004 @07:36PM (#11047338) Homepage
    - "blocklists" are also questionable because the maintainers of these lists gain a lot of power and often ask for huge amounts of money for address-ranges which were accidentally added to be removed again!

    - "teergruben" are a nice idea, but they would have to rely on source address filtering or only kick in after a few hundred messages. and if the spammer simple multithreads his sending "server" he might not be THAT bothered with slower delivery, as he can have thousands of concurrent deliveries, totally bogging down the receiving server!
    and also, if teergruben should just be the exception it is trivial to add a timeout to the delivery routine to abort after 1 minute or so of trying to deliver!

    - "bandwidth suckers" - this is just the kind of anarchistic vigilante justice that SHOULD SIMPLY NOT occur! even if it were not for the "collateral damage" to the network infrastructure and "innocent" pages being accidently hit, this is no better than stoning criminal suspects to death without proper trial...

    - "sugarplums" - this idea is actually pretty good but looking at the small return that spammers are getting at the moment this won't really slow them down much. even at 1% reached mail addresses the spammers still have virtually no cost in sending millions of mails out and thus will be hindered but far from stopped by injecting wrong mail addresses! also you have to generate those fake addresses without the spammers getting behind your mechanism of randomizing the addresses and you MUST also take care NEVER to inject a valid mail address by chance!

    there has actually been quite a discussion how to make mailing more "reliable" on a grand scale and i still find the idea of forcing mail servers to solve some computationally expensive computation rather nice. although this will cost legitimate service providers a little in hardware this will hit the mass mailers by far worse because they simply rely on cheaply mailing millions of mailings in a short time frame...

    well, so much for "innocent" protocols used in a hostile, mercantilistic, hard-to-trace and more-or-less-anonymous environment...

    jethr0
  • by devilspgd ( 652955 ) * on Thursday December 09, 2004 @07:52PM (#11047433) Homepage
    And when a spammer puts your URL in their spam, you'll just happily pay the bandwidth bill in the name of fighting spammers?

    Repeat after me: Do not fight abuse with abuse.
  • Re:SPF Records (Score:3, Insightful)

    by Progman3K ( 515744 ) on Friday December 10, 2004 @03:07AM (#11049374)
    I believe it IS good to have as much authentication as possible, but not to the point where it would make the system brittle.

    It just seems that the more security layers you have to go through, the more chance you have of something failing.

    What if you wanted to communicate with a non-compliant e-mail recipient?

    Obviously, if SPF becomes the law of the land, and EVERYONE starts using it, the problem of spam would go away, at least for a while ;-)

    But it's the same phenomena slowing IPv6 adoption, things work (albeit with certain problems) now.

This file will self-destruct in five minutes.

Working...