Date: Thu, 29 May 2003 09:40:02 -0500 From: Kirk Strauser <kirk@strauser.com> To: freebsd-questions@freebsd.org Subject: Re: Spammers forged my address - help unbury me from bounces? Message-ID: <87r86hx1dp.fsf@pooh.honeypot.net> In-Reply-To: <5.2.0.9.2.20030529085433.017db528@mail.servplex.com> (Peter Elsner's message of "Thu, 29 May 2003 08:57:10 -0500") References: <5.2.0.9.2.20030529085433.017db528@mail.servplex.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--=-=-= Content-Transfer-Encoding: quoted-printable At 2003-05-29T13:57:10Z, Peter Elsner <peter@servplex.com> writes: > This sounds like a dictionary attack. They simply put your domain in and > run through hundreds of names and prepend it to your domain. One or more > is bound to go through... I think you misread it a bit. They were sending out hundreds of thousands of emails to *other* mailservers with forged headers like: From: Michelle@honeypot.net The problem wasn't that they were sending all of the messages to *me*; I would've shut that down in a heartbeat. The real issue was that the all of the addresses they tried to send to that weren't reachable bounced, and since my domain was in the From: line, I was being deluged with tens of thousands of bounce messages from thousands of MXes around the world. Now I have thousands of lines in my maillog like: May 29 09:38:04 kanga sm-mta[13551]: h4TEc2DY013551: ruleset=3Dcheck_rc= pt, arg1=3D<Michelle@honeypot.net>, relay=3Dns2.computerland.pl [62.89.69.3= ], reject=3D550 5.0.0 <Michelle@honeypot.net>... This account was spoofed b= y some jackass spammer.It doesn't exist. May 29 09:38:04 kanga sm-mta[13551]: h4TEc2DY013551: from=3D<>, size=3D= 3804, class=3D0, nrcpts=3D0, proto=3DESMTP, daemon=3DMTA, relay=3Dns2.compu= terland.pl [62.89.69.3] May 29 09:38:05 kanga sm-mta[13551]: h4TEc2DZ013551: ruleset=3Dcheck_rc= pt, arg1=3D<Michelle@honeypot.net>, relay=3Dns2.computerland.pl [62.89.69.3= ], reject=3D550 5.0.0 <Michelle@honeypot.net>... This account was spoofed b= y some jackass spammer.It doesn't exist. May 29 09:38:05 kanga sm-mta[13551]: h4TEc2DZ013551: from=3D<>, size=3D= 3804, class=3D0, nrcpts=3D0, proto=3DESMTP, daemon=3DMTA, relay=3Dns2.compu= terland.pl [62.89.69.3] May 29 09:38:14 kanga sm-mta[13559]: h4TEcDDY013559: ruleset=3Dcheck_rc= pt, arg1=3D<Erin@honeypot.net>, relay=3Ddemrel02.henkel.de [193.96.101.29],= reject=3D550 5.0.0 <Erin@honeypot.net>... This account was spoofed by some= jackass spammer.It doesn't exist. May 29 09:38:14 kanga sm-mta[13559]: h4TEcDDY013559: from=3D<>, size=3D= 4096, class=3D0, nrcpts=3D0, proto=3DESMTP, daemon=3DMTA, relay=3Ddemrel02.= henkel.de [193.96.101.29] but at least I'm not spending my disk or bandwidth to process those bounce messages - I only have a waste a single TCP connection. =2D-=20 Kirk Strauser --=-=-= Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQA+1hvC5sRg+Y0CpvERAsbjAKCg5QoO8xJ0te3bjbZHd6xV4mGeRQCfdQgh wvOfe4W8ZpqosOAHDOdeulI= =//aB -----END PGP SIGNATURE----- --=-=-=--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87r86hx1dp.fsf>