Spamholes Fighting Spammers 396
mike9010 writes "A person named I)ruid has come up with an ingenious way to combat those spammers. His program, spamhole, creates a false 'open relay' that the spammer thinks he/she can send messages through. The messages then get sent nowhere, and the spammer has no idea.
"spamhole is an open project. Hopefully, through user's and developer's contributions, we will amass a collection of spamhole implementations spanning all commonly used platforms, programming languages, etc. Ease of configuration and use are the primary objectives, for the easier to use by the non-techical layperson the implementations are, the more widely adopted and used spamhole will become.""
How can this work? (Score:4, Insightful)
This system will only increase the number of open relays out there.
The story of the hare and the briar patch comes to mind. Is this the idea of a spammer who is pleading with us to please not create all these open rel..., er, um, spamholes?
Re:How can this work? (Score:5, Informative)
When an SMTP client connects to our spamhole, we note the number of times it has connected before. If this number is below a configurable threshold, we simply redirect it's connection through the spamhole to a real SMTP server and allow it an unmodified session. This provides for any potential 'test' email the spammer may attempt to send through the 'open relay' to verify successful delivery to successfuly pass through the system and be delivered. Many spammers do this to validate their open relays prior to attempting bulk mailings. The downside to this is that a few SPAM emails may actually be delivered by your spamhole. Such is the price to pay for tricking the spammer into continued use of your 'open relay'.
So it's not quite just a dumb smtp receiver, but acts as a real one until the spam starts being sent.
Re:How can this work? (Score:5, Insightful)
Yes, but if the spammer sends test emails alongside the spam, they won't get through, and he will know it's a spamhole. This system will likely work well until the spammers realise that it is being used, after which it will be easy for them to hack their way around it.
Re:How can this work? (Score:5, Funny)
Re:How can this work? (Score:5, Insightful)
The initial test email would highlight the spammers test email address. All email to this address would then be allowed through the spamhole, giving the impression to the spammer that everything is hunky dory.
However, the spammer may use multiple test addresses, and the spamhole would not then be aware of these.
Therefore the spamhole could check for any addresses that were used frequently/periodically, and mark these as test addresses.
But the spammer could use a more complex set of test addresses.
The spamhole could use a combination of Bayesian filtering with Hidden Markov Models to renumerate potential test addresses with exponentially decreasing returns, such that the k-tuple value Z1 was never equal or above the Nth degree of reductionist SPAM (SPre). This would thus allow network strategist to implement a theory-based approach to network spam usage, thus continuing ad-infintum the ARMS RACE.
The result of this is that both spammers and anti-spammers remain in bussiness, spending exponentially increasing efforts attempting to thwart the efforts of the oposition.
Definition of a game: "A constructed conflict with quantifiable outcomes"
Ever get the feeling that the anti-spammers enjoy this whole malarky just as much as the spammers?
Maybe the answer to spam is this:
STOP wasting money and resources on using incresingly sophisticated anti-spam techniques. Re-direct this money into basic education for users, including short courses on:
1. How to identify a spam (People are proven to be far better at pattern recognition than Bayesian models).
2. How not to click on a spam.
3. How to delete a spam.
If AOL, MSN, and all other involved parties put a concerted effort towards this, then spam would soon get diminishing returns, and hence become increasingly unprofitable.
Re:How can this work? (Score:5, Insightful)
Re:How can this work? (Score:3, Insightful)
Re:How can this work? (Score:3, Insightful)
We have to think outside the box with the spam problem, and this fact may be a novel way to counter spam. Almost all people i know who have been "conned" by spam had been new and naive email users who had got excited becuase they had recieved email.
We may look down on such users, but we were all naive once, its just that spam wasnt around when most of us lot started using email.
Therefore, I suggest, all email ser
Re:How can this work? (Score:4, Interesting)
Think about...
on yahoo mail "This message wasn't for you? Is it SPAM? _Bounce it_."
Re:How can this work? (Score:3, Informative)
Re:How can this work? (Score:3, Interesting)
I think you're underestimating the difference in the average computer user between the strength of will to intelligence and the strengt
Re:How can this work? (Score:5, Interesting)
Open relay isn't the problem of net anymore, sophisticated spamware uses open proxies.
Open relays are these days hard to find as most smpt software ave sane defaults these days. OTOH With idiots like analogX proxy authors [mail-archive.com] creating proxies with "default open world wide, not even dangerous ports closed" configuration, there is no sortage of open proxies.
If you really want to blackhole/track open proxy/relay abusers, look at BuggleGum proxypot [std.com] instead. And prepare to hack it as as spamware tries to adapt the traps setup by people.
Re:How can this work? (Score:3, Insightful)
Distriuted spamming of some kind :)
Re:How can this work? (Score:5, Interesting)
It makes me sort of sad. I'm in a unix sysadmin class, and we had a guest speaker in from a major ISP the other day, and to quote him "we've seen our email traffic quadruple over the last year, all spam" "spam is killing the internet."
Doubt if its as bad as all that, but again, the internet would be a heck of a lot better without it.
Re:How can this work? (Score:5, Interesting)
Doubt if its as bad as all that...
I don't. Spam eats up bandwidth just being delivered, even if it gets filtered at the end anyway. Then, you have the idiots that sit and open it and wait for images to load in their HTML-enabled mail clients. Despite this, from a technological standpoint, although it chews up and wastes valuable resources, it won't bring the Internet to a complete screeching halt.
However, look at all the time and money AOL puts out trying to block incoming spam. People always talk about making spam unprofitable for the spammers and someone invariably bitches about the ideas put forth, but how long will it be until there's so much and so varied spam that it's unprofitable to allow users to use e-mail? Eventually, we may well need so many people and tools that it will chew away profits just fighting spam.
That's why I think spammers need to be treated exactly for what they are - a parasitic infection. They just chew up resources but provide nothing in return. They must be inoculated. Make sending unsolicited e-mail a crime (our illustrous guvmint morons took a step in the totally OPPOSITE direction with their "yea, let's legitamize spamming" bill yesterday). If you're convicted of sending mass, unsolicited messages (that is, you can't prove that you were given EXPLICIT permission to send them), make it a felony and make one of the required sentences that you're not allowed to ever tough a computer again. The trick after that, of course, is to get all the spammy Asian and S. American countries to go along and punish spammers as well.
Re:How can this work? (Score:4, Insightful)
Don't count on it. There are worms that spread to create spam relays, and then those relays send spam. Potentially this leads to exponential growth in traffic...
Re:How can this work? (Score:4, Funny)
Spam eats up bandwidth just being delivered, even if it gets filtered at the end anyway
Yeah, but just think of all the extra bandwidth we'll have once UCE, viruses and scammail are finally banished by the Spamish Inquisition (nobody expects the Spamish Inquisition)!
Re:How can this work? (Score:2, Insightful)
Most spammers use automated tools to fire off a huge amount of messages. They wouldn't likely bother with sending a message to themselves.
But if the spammer did decide to validate the server, it means he has to find another open relay. If there are a ton of spamholes out there, and few real open relays, then the spammer will have to waste an enormous amount of time searching for a relay he can use.
This system will only increase the num
Re:How can this work? (Score:2)
Rus
Re:How can this work? (Score:5, Informative)
Plus, for some of the more nazi-esque spam block lists, it can cause MAJOR havoc for your network. I can tell you that this will not be implemented on our network. We've delt with this already... One computer on our network had an open relay for a couple of days, and it caused *.rr.com (road runner cable, HUGE ISP on the right coast) to block ALL MAIL from our
And it was pulling teeth to get us off of that block list. Send email, get response "contact your ISP", sent email explaining we were the ISP, got email "contact your ISP", sent email madly declaring that we can fix it if they'd tell us what was wrong, but with more than 100 computers in that IP range, it was kind of hard to tell who was in trouble, got email "contact your ISP"... etc.
I'm NOT going to put anything on the network that deliberately sends spam, or even looks like an open relay. My business is too important to me.
Thanks, but, no thanks.
~Will
Re:How can this work? (Score:3, Insightful)
Yes, and then when all the spamhole users compare the addresses attempted to send through them, they'll have a valid email address for the spammer.
I don't think this will work.. (Score:4, Interesting)
Re:I don't think this will work.. (Score:2, Interesting)
No place to hide a diamond like in a pile of glass sherds. Finding the diamond is slow and painful work...
Re:I don't think this will work.. (Score:2, Insightful)
Re:I don't think this will work.. (Score:3, Insightful)
And then, as an added bonus, spamhole could be written to watch for these email addresses. Now we've got a real email address for these bastards...
Re:I don't think this will work.. (Score:3, Insightful)
Even if the spamware doesn't detect this now, it will by tomorrow. As a mail admin, I current use 2 RBL blocklists, + hardcoded addresses for serious offenders telesp.net.br and shawcable.net + Bayesian filter. I still get spam in my inboxes.
Spammers aren't stupid, just evil.
Track IP addresses, not email addresses (Score:3, Insightful)
Re:I don't think this will work.. (Score:5, Insightful)
Re:I don't think this will work.. (Score:5, Interesting)
That points to an interesting idea. What if you left your relay open, but modified the messages slightly? Munge the URLs, kill the scripts and web-bug images, change all the phone numbers to 800-876-7060 [fraud.org]. You could even try to de-l33t the subject lines (turn V*1*A*3*R*A back into "viagra"), if possible.
Of course, you'd be violating any number of standards, plus you'd still get blackholed. So take it a step further... create a trojan that looks for open relays and turns them into spam-breaking open relays. Maybe you could then get someone to turn you in to Microsoft and split the reward.
Re:I don't think this will work.. (Score:3, Insightful)
Re:I don't think this will work.. (Score:4, Funny)
Oh, you mean like when they read about it on Slashdot?
Re:I don't think this will work.. (Score:3, Interesting)
RTFA
From spamhole.net:
When an SMTP client connects to our spamhole, we note the number of times it has connected before. If this number is below a configurable threshold, we simply redirect it's connection through the spamhole to a real SMTP server and allow it an unmodified session. This provides for any potential 'test' email the spammer may attempt to send through the 'open
Nice spinoff... (Score:5, Funny)
Stick it in your spamhole, pal!
Perfect...
Re:Nice spinoff... (Score:2, Funny)
Re:Nice spinoff... (Score:2)
Perhaps some sort of joint business venture with the Goatse guy might be in order. Spamhole T-Shirts, maybe?
Sounds good (Score:3, Insightful)
Spamming method (Score:5, Insightful)
Of course that is easier said than done
Rus
Re:Spamming method (Score:5, Funny)
Well, I'm told hitting them in the kneecaps can be quite effective too.
Re:Spamming method (Score:3, Funny)
Rus
Re:Spamming method (Score:5, Funny)
It's not going to work... (Score:5, Insightful)
How are they supposed to know the difference between a spamhole and a real open relay?
Re:It's not going to work... (Score:3, Informative)
Don't they test that the relayed mail is actually delivered? ORDB does:
http://www.ordb.org/faq/#mail_accepted [ordb.org]
Any tester that doesn't isn't very intelligent...
Re:It's not going to work... (Score:5, Informative)
Re:It's not going to work... (Score:3, Informative)
Re:It's not going to work... (Score:3, Informative)
That may not be a big deal since you wouldn't run this on your actual email server anyway. Most blackholes only list specific IP's and not entire blocks (at least the reliable blackholes don't list entire blocks) just because one IP in the range runs an open relay.
Typical five minutes h4x0r fix (Score:5, Funny)
+ It will fool spammers for five minutes.
+ Your ISP will disconnect you after five minutes.
Let's chalk this one up as yet another "nice try, shame about the lack of planning".
Watch out for your ISP (Score:5, Interesting)
Isn't that interesting... (Score:4, Insightful)
The problem is different ISPs (Score:4, Informative)
So just because you've dealt with an ISP that is in the "don't give a shit" category, doesn't mean there aren't other ones that will be very responsive.
will my head sysadmin allow it? (Score:5, Insightful)
a) as mentioned before, it is easy to probe the hole to make sure it really works.
b) i seriuosly doubt that the security team of any university and / or company would enable such a hole because then they might get blacklisted and no more email for them...
Nahh, spamd. (Score:5, Informative)
OpenBSD's spamd [openbsd.org] actually tarpits the spammer down, then after a looooong held connection sends a 450 (by default) to the spammer to have the spammer-machine retry. I have it running with various autoupdated blackhole lists and very little spam sees my server anymore.
Re:Nahh, spamd. (Score:5, Insightful)
But you have to wait or SMTP fails (Score:3, Interesting)
HoneyPots (Score:4, Interesting)
The trick is much like the polution on P2P. People often complain that the stuff they download off P2P is either renamed [e.g. no the thing they were looking for] or of very low quality. This dissuades people from using P2P.
Likewise if lots of people setup fake SMTP servers that don't do anything it will polute the "scene". Possibly make it less attractive for spammers.
Of course what would be nicer is just to snipe the spammers and auction off their property for Quiznos money
Not going to work (Score:5, Interesting)
The solution is to accept that email will become 99.9(n) junk, and that the challenge then becomes to extract the signal, not filter the noise.
One solution I foresee is "data clearing houses" which store-and-forward email, using a reputation management system to rank and score email (and other data, for the problem is general).
Re:Not going to work (Score:2)
Rus
Re:Not going to work (Score:3, Funny)
I won't beleive it until I see the RFC.
Re:Not going to work (Score:3, Interesting)
Then have a system where an ISP can automatically get themselves removed from the blacklist after 1 day, when they think they've solved the problem. Next time make it 2 days, if they get to the list again, then 3 days etc, perhaps maxing out at about
Please do not run this (Score:5, Informative)
It won't work.
On a small scale it has no impact.
On a large scale the spammer will just send a few 'test' messages through your system and move on to the next. With a million spamholes, a spammer can send a million mails at the least. Great.
Also, you'll get yourself blocklisted by every major DNSBL very soon. They scan for open relays too...
He's reinvented proxypots. (Score:5, Informative)
Slashdot, on the cutting edge of last year.
Maybe this is just me being cynical... (Score:5, Insightful)
Hmm.... (Score:4, Interesting)
I guess that as soon as they decide that your mail server is open to relaying they will pump their mails as quickly as possible trough to the server...
Wouldn't the bandwidth consumed while pumping all those pr0n mails trough to your server slow your xDSL (or whichever connection you have) to a grinding halt and thus make the project more suited towards those with a fat connection and something to prove?
Re:Hmm.... (Score:5, Informative)
Had a form.pl script handling all form submissions on our web site. The form submitted its info via sendmail, as well as logging to text files. While the address checking was pretty robust, someone figured out how to overload the contents in a manner that fooled the sendmail into thinking that the contents contained BCC: data.
Fortunately I caught it within about five minutes, thanks to the fact that all submissions are CC:'d to a real address, thus starting a flood of mail. I saw the classic pattern: a test message, a couple revisions, a final draft test message, then the flood of "real" messages. Since I saw it start, I was able to shut down the script (I just killed the Execute permissions).
After the initial test messages, I saw submissions from dozens of different IPs - I assume zombied PCs. It seems that the zombies were programmed to relay form POST submissions, instead of trying to relay mail directly. Smart, since that puts the mail load on a fast server, not a slow dialup PC.
But the really interesting thing was, even after shutting down the script, the flood of submissions continued. I tweaked the form.pl to bounce the requests to another page but the bounce was never followed - indicating to me that the program didn't bother to check the server response to the submission, even for a 404 or 302 response! This continued for around 14 hours, at a rate of about 20-40 hits per minute. Based on the first messages that got through, several hundred addresses were included in each BCC: field.
Suddenly at about T+14 hours, it simply stopped - cold. For the next several hours a few sporadic hits popped up. Haven't seen any since about T+18 hours.
Apparently the spammer assumed his script would succeed once it was successfully started (it WOULD have unless I'd been at the PC). He obviously ran through his entire mailing list "blind". I'm happy to say 13.8 of those 14 hours were wasted, preventing about 7 million spams (14 hrs, 40/minute, 200 addresses each).
As lessons learned, although I'm sure this is old news to most of the
1) The spammer used our web site's form to build his attack, but then took it to another machine. All subsequent submissions were using a POST method but not from our site's page. No surprise there, but simply checking $ENV{'HTTP_REFERER'} could have prevented 99% of this attack - if not making it pointless to begin with.
2) Sendmail can be fooled into reading BCC: addresses from information after the start of the message body. I don't understand the details, but an obvious preventative is to =~ s/bcc://gi on the message before sendmail gets it. Probably wouldn't hurt to do the same to To: and CC:.
3) Sendmail can be fooled into sending encoded text from an otherwise text-only form. Filter out "Content-Type:" or "Content-Transfer-Encoding:" or "multipart/mixed" or "text/html" before sendmail gets it.
4) If you're watching for abuse, don't rely on looking for multiple hits from one IP - it seems that once you become a target you will likely get a distributed attack.
5) Consider replacing all @ signs... do a s/@/-at-/g on all message fields before sending to sendmail (except of course whatever hard-coded To: is at the start of the message). If all other measures fail, at least you won't get blacklisted, although you might get 7 million "undeliverable" replies.
Re:Hmm.... (Score:5, Informative)
I've written before [slashdot.org] about writing a fake formmail. Right now I've got my web server set up so that all requests for formmail (m/formmail/i) get directed to the script; as you can see, I still get hit [saintaardv...rpeted.com] about once or twice a week. I'd really like to figure out how to tarpit them, but I'm not sure I can do that on a running webserver.
PHP and SMTP (Score:3, Informative)
A
Been there done that... (Score:5, Interesting)
Our provider gives us unlimited upstream bandwidth, so it had no real effect on us- however here would have been at least 50gb worth of data used by the time the spammer caught on, so hopefully that cost them some cash. (Although in all likelyhood it was only a minor inconvenience).
It's a great idea, but I have one question. (Score:2, Insightful)
Your netblock is at risk (Score:3, Insightful)
Some RBL's do not allow changes to be made unless you pay a big fee, and you lose the fee if they consider the complaint genuine.
This sounds real risky to me
Simon.
Tarpitting (Score:4, Interesting)
Sorta makes you wonder... (Score:3, Interesting)
Strange way to combat Spam (Score:5, Interesting)
While the concept is somewhat interesting at first glance, the people who run spamholes might end up with it costing them a lot of bandwidth and system resources.
In short, this idea might only work if somehow you could get more spamholes on the net than open relays, and even then it would have to be coordinated by real sysadmins who know their stuff. Clueless admins are (probably) in the majority and whether or not you agree with that little flippant comment, they will surely outnumber the people who have enough time, a spare machine, and bandwidth to run a spamhole.
This guy says that he has 'holed' over 50,000 spam messages. Well, not really. They will be retransmitted. Spending the energy on blocking spam from your users completely is a better bet, I think. Educating people and advocacy is a better bet. Spamholes will be just another 5 minute net curio.
The Power of the Lexicon (Score:4, Funny)
That's not what a 'spamhole' is around *my* office. Pfft!
two potential problems (Score:5, Insightful)
I see two potential problems with this approach, one more insipid than the other.
Haven't you only succeeded in sponsoring a low volume spam relay that not only delivers spam, but at such a low per-boxen rate that no one will ever be the wiser for it.
I see that even on your homepage you mention that a few spam emails might get delivered, but you are acting as a relay for a few spam emails times 50,000. You will eventually get blacklisted via OpenRelay RBL's.
I think if you sit down for a day and just watch your email logs, you will find that a lot of spammers don't bother to test a connection for open relay status. They just test by pushing as much email through it that they can as quickly as possible. Daily I have hundreds of attempting mail relay deliveries.
Re:two potential problems (Score:3, Informative)
Now you have a really popular tricksy and you have 50,000 spamholes on the internet. This will delivery 50,000 X 2 free test emails. Why not just use that free 100,000 emails to deliver spam instead.
Because to send each of those two 'free' emails from each of the 50,000 spam holes, you have to bring up 50,000 separate SMTP connections and send the email text 50,000 times, thus completely maxing out your connection. This is not the way spammers want to work.
Instead, they find high bandwidth open relays
Proxy Honeypots been doing this for ages (Score:5, Interesting)
Several other people are still running proxy honeypots with great success. They are a great resource for finding out which ISPs harbor proxy hijacking criminals.
For all of you, who think spammers will check whether the proxy works first, spammers do no such thing. They actively scan for open proxies and immediately start blasting away. That's just like with spamming. You really think spammers check every Email address on their lists is real?
Proletariat of the world, unite to kill spammers. The more painful and slower, the better.
Plan for Spam Prevention (Score:4, Interesting)
like dan@example.com and danc@example.com since danc only exists as a harvestable address any messages that show up at danc are compared to the messages in the spool for dan and a 95% or more match pushes them both to the trash. Has anyone else tried this or something similar?
Re:Plan for Spam Prevention (Score:3, Insightful)
It's been done. The Vipul's Razor portion of Spamasassin generates signatures from known spam. People feed spam sources into it.
The only problem is that dan@example.com would receive kretiv1y R/\N|)0/\/\][Zed di||erent tipes of spam. Twinkies limes in spain. \/|AGRA \/|AGRA \/|AGRA.
I thought that maybe applying pattern equivalencies, dictionary and grammar checkers to create signatures based upon "real sentences" would improve things, but before I could do it, randomized jibberish like this came out:
Instead of putting your address in clear... (Score:3, Informative)
a trap bu tnot a solution maybe (Score:2, Interesting)
Just a thought (Score:3, Insightful)
Fed up reading such non-working stuff (Score:4, Interesting)
May I suggest just doing a few basic things:
1) Make a law (if your country doesn't have one already) which makes it illegal to send emails with forged FROM fields (= email addresses you don't own)
2) Slightly improve RFC2821 (smtp): Convert the optional ssl layer to a mandatory one. An smtp sender should only allowed to send mail to a server if
a) it uses an ssl encrypted connection and the Hostname in Reverse-DNS matches the name provided with the ssl certificate OR
b) it uses username and password to login into some kind of mailaccount
3) Sue spammers violating law 1) to hell. If you want to find them, you only have to look at the ssl certificate used for the connection.
Yes, I know this prevents everybody from having his own pretty little smtp server. No, I'm perfectly well with that. Use a provider.
Yes, ssl certificates are expensive for now. But any serious provider should be able to afford one.
Re:Fed up reading such non-working stuff (Score:3, Insightful)
And when people violate it, you track them down how, exactly? Please explain.
Slightly improve RFC2821 (smtp)
What you term "slightly improve", I would call "change EVERY mail server and client in the world". Oh, wonderful solution. Even if this was pushed through today, it would take years (at best) to happen. As a much smaller-scale example, all new X.
This doesn't solve anything (Score:2, Interesting)
This does nothing to address the traffic/bandwidth usage. I've seen spammers continue to hit mail servers for several years (yes YEARS) after they were locked out, they just don't care. The bandwidth costs become seriously problematic.
and the second thing, sort of the first, or related, is what the issue never getting addresses about EGRESS filtering.
Now if everyone, or at least every major ISP would actually use egress filtering, the spam problem would be reduc
Re:This doesn't solve anything (Score:3, Insightful)
Well, wouldnt merely locking them out cause mail to bounce?
But this Spamhole thing will at least make the Spam disappear at the first relay. Not bounce back. Not propagate on. It'll reduce some of the overall bandwidth usage.
Plus, from a purely users' PoV, whether it sav
Another nice "spamhole" project (Score:2, Informative)
It lets you set up a temporary forwarding address, which can be very useful for those "free registration" things that just scream "SPAM!".
Bad-Address Reporting (Score:5, Interesting)
What I would like is a tool that hooks into Postfix (or whatever MTA; I use Postfix) that not only blacklists the sending IPs on my machine, but even reports the sending IP to an RBL. At a bare minimum, this would be a useful tool for me, since it would keep these spammers from proceeding to send spam to any other addresses on my server. At best, this simple method of confirming that a spammer is a spammer could help to reduce spam on the whole.
-Waldo Jaquith
Make it costly for spammers (Score:4, Interesting)
What if everyone who got spam took 5 minutes a day and replied to a few? I am not saying they need to actually be interested in the pitch, but just send a nice polite letter saying you are. Could you send me some info by postal mail? Do you have an 800 number I can call? Could you contact me with greater detail to this question? Now, the spammer has to invest some time and possibly some money.
Millions of people get spam. If a small percentage would do this, would it deter spammers?
Why this is a horrible idea. (Score:4, Insightful)
2: The spammers will eventually be able to find a way to test it first (like they have with everything else.)
3: It'll just suck up bandwidth and dump it to
4: Even if the idea did work in theory, there won't be enough people believing in the idea to make it actually work.
Surely this idea (Score:4, Interesting)
When one of our servers detects a spammer it communicates this to all it's little peer friends and they launch a DDOS for a few minutes. If the same spammer hits the same (or another) node in the Spamnet he gets hit for longer etc.
It's not a perfect idea (and probably illegal) but it would certainly get the attention of whoever is responsible.
This is nothing new... (Score:5, Informative)
Proxypots are a variation of the honeypot idea. A proxypot pretends to be an open proxy server which, instead of actually passing traffic sent to it, simply logs what's going on and sends the actual traffic to a specific destination specified by the proxypot operator. This can be Dave Null's in-box or anywhere else said operator wants.
Details of proxypots may be found here, [stupidspam.co.uk] and here, [std.com] just to name a couple.
Keep the peace(es).
Re:Does it help? (Score:2)
Re:Does it help? (Score:5, Informative)
It already is. I live in the UK and the majority of junk emails I receive come from the US, or contain 'offers' from US based companies.
Re:Does it help? (Score:2)
I kind of missed out the point that a large portion of junk emails originate from servers in the Far East already so from your perspective (presumably US perspective, since you said 'offshore' without thinking) it already happens.
Re:Does it help? (Score:2)
mmm...ok. whatever.
offshore, regardless of perspective, pretty much means "not here."
Re:Does it help? (Score:2)
In which country? All of them? Making spam illegal and punishable in just a few countries will barely dint the tide of spam arriving in our inboxes.
Re:For all of you who will say "This won't work" (Score:3, Insightful)
Re:For all of you who will say "This won't work" (Score:2)
Example: A friend's solution to overcrowding: "Have lots of children." If I can't think of a better solution to overcrowding, that doesn't mean that he automatically has a good idea.
--RJ
Re:For all of you who will say "This won't work" (Score:5, Informative)
First, my mailserver runs OpenBSD [openbsd.org], this allows me to use pf [openbsd.org] for my port filtering software. Then each user on the server has a copy of CRM114 [sf.net] installed. This is a very powerful and extremely accurate bayesian classifier. I've gotten 1 piece of spam in the last three months, 0 false positives and it blocks about 150 pieces of spam a day (for my account alone).
For each piece of mail that I receive, the relays involved are entered into relaydb [benzedrine.cx]. This wonderful little program logs each mail relay listed in the message. When a relay has 3 times as many bad messages as good messages it is added to the black list. Because I'm using pf, this blacklist is updated in real time to the mail server's pf configuration, which causes spamming hosts to be sent to the tar pits.
I'd estimate the total accuracy rate (defined as non-Type I and non-Type II errors) to be somewhere around 99.95%. User interaction is zero for most of the time, I've got a nice corpus that I train the accounts with. On the off hand that there is an error the user mails the message to themselves and it gets fixed.
So, to summarize:
This idea won't work, you'll get your host marked as an open relay.
This is what I did to kill spam and it does work.
Try this approach...... (Score:5, Interesting)
I have been the victim of a spam which used my e-mail in the forged From line. I have been receiving all the 'undeliverable' bounces as a result. Of course I got fed up and decided to do some research.
I picked out the origination IP from the header of the attached bounced mails (always valid) and did a port scan on then. I found most of them infected with the Jeem trojan.
Well, this explains the open relay. I gave up complaining to ISP's about their subscribers who have trojaned systems. They don't seem to care. I suppose it's time for vigilante justice.
The Jeem trojan opens up an e-mail relay on a random port and a control connection plus an http proxy on their own random ports. Time to fight fire using the same fire.
After 'safe browsing' the web sites listed in the spam mails, a lot of them have form information (usually requesting credit card info). Why not use a program that uses a trojaned system's HTTP proxy to send invalid data as the form contents. I was able to send URL encoded form content based on the form's fields which easily bypassed the form's javascript validations. In return, I get an expected confirmation screen. Hey, maybe they just got one invalid response.
Now, if this can be done often enough, maybe the ISP will see the traffic and suspend the account of the trojaned system. In the meantime, the source of the SPAM gets a lot of invalid info to filter through. When I say invalid data. I don't mean 'asldfhhfsdf' and such. I mean real looking names, addresses, CC numbers, etc.
I know there are flaws with this idea, but I don't see where it wouldn't start becoming a thorn in their sides. The Jeem trojan can be controlled remotely. I wish I knew the remote commands to turn them off. But, if we use their known trojans against them, maybe they'll turn them off for us.
Re:I have a better solution (Score:3, Interesting)
The actual problem is at least two-fold
1. The actual spam traffic slowing things down, costing core network operators, and this cost getting passed down to ISPs and ultimately end users.
2. The threat to home PCs that get hacked for the purpose of sending SPAM from them.
Filtering or hiding your e-ma